Kaspersky Lab has predicted that hackers are going to up the ante with their attacks next year. The company believes that among other high-profile targets, hackers will pinpoint banks and may go as far as taking cash directly from ATMs.
Cyber criminals are growing in confidence: before they tended to attack users of banking services, seeing them as the weak link in the security chain, but next year Kaspersky Lab experts anticipate high-stakes targeted cyber-attacks pinpointing the banks themselves. And the fraudsters won’t stop here: Kaspersky Lab expects they will go for broke and try to develop new malware that can take cash directly from ATMs. In addition to financial cybercrime, 2015 is also likely to bring even more privacy concerns, security worries about Apple devices and renewed fears about connected devices to prevent hackers using tools like network printers to penetrate corporate networks.
Predictions” is the first of four parts of the Kaspersky Security Bulletin 2014.
Next year’s insights: what to expect
¬∑ Attacks against virtual payment systems, which could be extended to the new Apple Pay
¬∑ Attacks against ATMs
¬∑ Malware incidents where banks are breached using methods coming directly from the targeted cyber-attack playbook
¬∑ More Internet-bleeding stories: dangerous vulnerabilities appearing in old code, exposing the Internet infrastructure to menacing attacks.
¬∑ In-the-wild attacks against networked printers and other connected devices that can help an advanced attacker to maintain persistence and lateral movement within a corporate network.
¬∑ Malicious software designed for OSX being pushed via torrents and pirated software packages
¬∑ A shift where the bigger, noisy cyber-threat actors splinter into smaller units, operating independently of each other. This in turn will result in a more widespread attack base with more diverse attacks coming from more sources.
Vabanque: a groundbreaking change:
During a recent investigation, Kaspersky Lab’s experts discovered an attack in which an accountant’s computer was compromised and used to initiate a large transfer with a financial institution. It represented the emergence of a new trend: targeted attacks directly against banks.
Once attackers get into a bank’s network, they siphon enough information to allow them to steal money directly from the bank in several ways:
‚óè Remotely commanding ATMs to dispose cash.
‚óè Performing SWIFT transfers from various customers accounts.
‚óè Manipulating online banking systems to perform transfers in the background.
ATMs are vulnerable:
Attacks against cash machines (ATM) seemed to explode this year with several public incidents and a rush by law enforcement authorities globally to respond to this crisis. As most of these systems are running Windows XP and also suffer from frail physical security, they are incredibly vulnerable by default.
In 2015, we expect to see further evolution of these ATM attacks with the use of targeted malicious techniques to gain access to the “brain” of cash machines. The next stage will see attackers compromising the networks of banks and using that level of access to manipulate ATM machines in real time”, comments Alexander Gostev, Chief Security Expert at Global Research and Analysis Team, Kaspersky Lab.
Attacks against virtual payment systems:
Kaspersky Lab Global Research and Analysis Team expect criminals to leap at every opportunity to exploit payment systems. These fears can also be extended to the new Apple Pay, which uses NFC (Near Field Communications) to handle wireless consumer transactions. This is a ripe market for security research and we expect the appearance of vulnerability warnings about weaknesses in Apple Pay, virtual wallets and other virtual payment systems.
The enthusiasm over the new Apple Pay is going to drive adoption through the roof and that will inevitably attract many cybercriminals looking to reap the rewards of these transactions. Apple’s design possesses and increased focus on security (like virtualized transaction data) but we’ll be very curious to see how hackers will exploit the features of this implementation”, added Gostev.
* Follow Gadget on Twitter on @GadgetZA