High Voltage of 2015: Kaspersky Lab’s Short-Range Predictions

By   ISBuzz Team
Writer , Information Security Buzz | Dec 02, 2014 05:02 pm PST

Cyber criminals are growing in confidence. Previously, they attacked users of banking services, seeing them as the weak link in the security chain. But next year, Kaspersky Lab experts anticipate high-stakes targeted cyber-attacks pinpointing the banks themselves. And the fraudsters won’t stop there; we expect they will go for broke and try to develop new malware that can take cash directly from ATMs. In addition to financial cybercrime, 2015 is also likely to bring even more privacy concerns, security worries about Apple devices, and renewed concern bout preventing hackers from using connected devices like network printers to penetrate corporate networks.

Predictions” is the first of four parts of the Kaspersky Security Bulletin 2014.

Next year’s insights: what to expect

·         Attacks against virtual payment systems, which could be extended to the new Apple Pay feature

·         Attacks against ATMs

·         Malware incidents where banks are breached using methods coming directly from the targeted cyber-attack playbook

·         More Internet-bleeding stories: dangerous vulnerabilities appearing in old code, exposing the Internet infrastructure to menacing attacks

·         In-the-wild attacks against networked printers and other connected devices that can help an advanced attacker to maintain persistence and lateral movement within a corporate network

·         Malicious software designed for OS X being pushed via torrents and pirated software packages

·         A shift where the bigger, noisy cyber-threat actors splinter into smaller units, operating independently of each other, which will in turn result in a more widespread attack base with more diverse attacks coming from a multitude of sources

Vabanque: a groundbreaking change

During a recent investigation, Kaspersky Lab’s experts discovered an attack in which an accountant’s computer was compromised and used to initiate a large transfer of funds within a financial institution. It represented the emergence of a new trend: targeted attacks against banks themselves. Once attackers get into a bank’s network, they siphon enough information to allow them to steal money directly from the bank in several ways:

·         Remotely commanding ATMs to dispose cash

·         Performing SWIFT transfers from various customers’ accounts

·         Manipulating online banking systems to perform transfers in the background

ATMs are vulnerable

Attacks against cash machines (ATM) seemed to explode this year with several public incidents and a rush by law enforcement authorities globally to respond to this crisis. As most of these systems are running Windows XP and also suffer from frail physical security, they are incredibly vulnerable by default. “In 2015, we expect to see further evolution of these ATM attacks with the use of targeted malicious techniques to gain access to the ‘brain’ of cash machines. The next stage will see attackers compromising the networks of banks and using that level of access to manipulate ATM machines in real time,” comments Alexander Gostev, Chief Security Expert at Global Research and Analysis Team, Kaspersky Lab.

Attacks against virtual payment systems

Kaspersky Lab Global Research and Analysis Team expect criminals to leap at every opportunity to exploit payment systems. These fears can also be extended to the new Apple Pay, which uses NFC (Near Field Communications) to handle wireless consumer transactions. This is a ripe market for security research, and we expect to the appearance of vulnerability warnings about weaknesses in Apple Pay, virtual wallets, and other virtual payment systems.

“The enthusiasm over the new Apple Pay feature is going to drive adoption through the roof and will inevitably attract many cybercriminals looking to reap the rewards of these transactions. Apple’s design possesses and increased focus on security (like virtualised transaction data) but we’ll be very curious to see how hackers will exploit the features of this implementation,” added Gostev.