Kaspersky Lab confirms return of bank-robbing malware
9 February 2016 |
A year after Kaspersky Lab warned that cyber criminals would start to adopt the tools and tactics of nation-state backed APTs in order to rob banks, the company has confirmed the return of Carbanak as Carbanak 2.0 and uncovered two more groups working in the same style: Metel and GCMAN.
They attack financial organisations using covert APT-style reconnaissance and customised malware along with legitimate software and new, innovative schemes to cash out.
The Metel cyber criminal group attack involves gaining control of machines inside a bank that have access to money transactions (e.g. the bank’s call centre/support computers). The gang can then automate the rollback of ATM transactions.
The rollback capability ensures that the balance on debit cards remains the same regardless of the number of ATM transactions undertaken. In the examples observed to date, the criminal group steals money by driving around cities in Russia at night and emptying ATM machines belonging to a number of banks, repeatedly using the same debit cards issued by the compromised bank.
Sergey Golovanov, principal security researcher at the Global Research and Analysis Team at Kaspersky Lab, said: “Nowadays, the active phase of a cyber attack is becoming shorter. When the attackers become skilled in a particular operation, it takes them just days or a week to take what they want and run.”
During the forensic investigation, Kaspersky Lab’s experts uncovered that Metel operators achieve their initial infection through specially crafted spear-phishing emails with malicious attachments, and through the Niteris exploit pack, targeting vulnerabilities in the victim’s browser.
Once inside the network, the cyber criminals use legitimate and pentesting tools to move laterally, hijacking the local domain controller and eventually locating and gaining control over computers used by the bank’s employees responsible for payment card processing.
The Metel group remains active and the investigation into its activities is ongoing. So far no attacks outside Russia have been identified. Still, there are grounds to suspect that the infection is much more widespread, and banks around the world are advised to proactively check for infection.
All three of the gangs identified are shifting toward the use of malware accompanied by legitimate software in their fraudulent operations: why write a lot of custom malware tools, when legitimate utilities can be just as effective, and trigger far fewer alarms?
The GCMAN actor goes even further: sometimes it can successfully attack an organisation without the use of any malware, running legitimate and pentesting tools only.
In the cases Kaspersky Lab’s experts have investigated, we saw GCMAN using Putty, VNC, and Meterpreter utilities to move laterally through the network till the attackers reached a machine which could be used to transfer money to e-currency services without alerting other banking systems.
In one attack observed by Kaspersky Lab, the cyber criminals stayed in the network for one-and-a-half years before activating the theft. Money was being transferred in sums of about $200, the upper limit for anonymous payments in Russia.
Every minute, the CRON scheduler fired a malicious script, and another sum was transferred to an e-currency accounts belonging to a money mule. The transaction orders were sent directly to the bank’s upstream payment gateway and did not show up anywhere in the bank’s internal systems.
Carbanak 2.0 marks the re-emergence of the Carbanak advanced persistent threat (APT), with the same tools and techniques but a different victim profile and innovative ways to cash out.
In 2015, the targets of Carbanak 2.0 were not only banks, but the budgeting and accounting departments of any organisation of interest.
And in one example observed by Kaspersky Lab, the Carbanak 2.0 gang accessed a financial institution and proceeded to alter the credentials of ownership for a large company. The information was modified to name a money mule as a shareholder of the company, displaying their ID information.
Golovanov said: “Attacks on financial institutions uncovered in 2015 indicate a worrying trend of cyber criminals aggressively embracing APT-style attacks. The Carbanak gang was just the first of many: cyber criminals now learn fast how to use new techniques in their operations, and we see more of them shifting from attacking users to attacking banks directly. Their logic is simple: that’s where the money is.
“And we aim to show how and where, specifically, the threat actors might hit to get your money. I expect that after hearing about GCMAN attacks, you will go and check how your web banking servers are protected; while in the case of Carbanak, we advise protecting the database that contains information about the owners of accounts, not just their balances.”