430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
New research finds that 430,000 users faced this issue in the first half of 2019. Of this, more than a third (30.9%) were corporate users, which is double the figure discovered in the first half of 2018 (15.3%).
Financial malware, commonly known as banking Trojans, is aimed at stealing finances and financial data, as well as providing threat actors with access to users and financial organisations assets and machines, Kaspersky says.
According to the company, these threats have always occupied a significant part of a threat landscape, as finance is the most common motivation for cybercriminals and fraudsters.
Kaspersky data on new samples of these threats highlight that malware aimed at stealing funds is active and dangerous, especially when it comes to corporate environments.
This is due to the fact that most corporate networks usually rely on connected devices, and if one is compromised then the whole entity may be under threat.
According to the research, typical attack vectors for malware are spam emails and phishing web pages. Web pages generally appear to be legitimate websites, but are created by threat actors in an attempt to steal credentials, bank card details or other types of sensitive information, Kaspersky says.
According to the report, during the first half of 2019, more than 339,000 phishing attacks from web pages disguised as landing pages of large banks have been detected.
The research also identified the most popular banking Trojan families that were used to attack corporate users.
Four-in-ten (40%) financial threats on corporate users came from the RTM banking Trojan – one of the most dangerous types of banking malware for businesses in 2018 Kaspersky says.
RTM is followed by the Emotet banking Trojan at 15%. This threat can be particularly damaging as once it gets inside the entity’s network perimeter, it can self-distribute through vulnerabilities in unpatched devices and then download extra threats onto the victim’s device, Kaspersky says.
Trickster banking Trojan is the top three identified malware, with 12% of discovered threats.
For private users, the situation was found to be different. The list of malware that attempted to attack them is topped by Zbot malware (26%), which steals credentials with the option of remote control by threat actors, followed by RTM and Emotet.
In 2018 RTM was almost entirely aimed at organisations, while figures from the first half of 2019 show that this malware is now reaching a significant share of ordinary, domestic users, according to Kaspersky.
Kaspersky security researcher Oleg Kupreev says, “We expect to see a rise in the number of attacked users in the second half of 2019. Usually, we see a rise in malicious activity after the holiday season, when people are using their devices less than usual and therefore are less likely to fall a victim to threat actors.”
“We urge everyone to be extra careful with all banking and finance-related operations that they perform online and remain vigilant,” says Kupreev.
To protect your business from financial malware, Kaspersky security specialists advise introducing cybersecurity awareness training for employees, installing the latest updates and patches for all software, forbidding the installation of programs from unknown sources, implement EDR solutions for endpoint level detection and remediation, and finally integrating Threat Intelligence into your SIEM and security controls in order to access the most relevant and up-to-date threat data.
On education, Kaspersky says it is important to train particularly those who are responsible for accounting and teach them how to distinguish phishing attacks. For instance, do not open attachments or click on links from unknown or suspicious addresses.
Kaspersky recommends private users always install security updates as soon as possible, do not install software from unknown sources, and use a reliable security solution.
- REMOTE Penetration Tester - UK. Senior
- United Kingdom
CH7941 Identifier Project REMOTE Penetration Tester - UK. Senior role. Agile, flexible company looking to attract an experienced Penetration Tester that values transparency, creativity and interesting varied work. To join a growing team to deliver varied (Infrastructure, Web application etc) remote penetration testing to an international client base. You must be technically exceptional, able to work remotely / independently and be able to effectively communicate / document / produce written reports. This is a client facing role, so you must be able to represent yourself and the business in the best light. Experience around penetration testing best practice / frameworks highly desired. Manual penetration testing experience highly valued. Any of the following tests / labs are desired, but experience over Pen 200, OSCP, TryHackMe (THM), HackTheBox (HTB), VulnHub, Virtual Hacking Labs (VHL) GIAC Certified Penetration Tester (GPEN) GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Certified Professional Certified Penetration Tester (CPT) Certified Expert Penetration Tester (CEPT) Offensive Security Certified Expert (OSCE) CompTIA PenTest+ EC-Council Licensed Penetration Tester Master Certified Mobile and Web Application Penetration Tester (CMWAPT)
- Head of CSOC (Cyber Security Operations Centre), London. Greenfield opportunity
CH7928 Identifier Project Head of CSOC (Cyber Security Operations Centre), London. Greenfield UNIQUE opportunity to establish, manage and grow a world class CSOC. Headquartered in the UK, the CSOC will grow and deliver cyber services into an international and underdeveloped market. As a greenfield site the Head of CSOC will be the first person on the ground to build a capability and team around them. The role will include, but not be limited to; Setting up and establishing a CSOC monitoring service using IBM QRadar and Palo Alto CORTEX XSOAR. Develop roadmap for future CSOC capabilities. Establish, develop processes, playbooks and use cases. Recruit, Build and train a specialist team. Build relationships with key clients- onboard and scale. The successful candidate must have experience working within / leading a technical Cyber Security monitoring capability. Technical experience working with IBM QRadar and Palo Alto CORTEX XSOAR will be highly beneficial, although other SIEM / Security Orchestration, Automation and Response tools are welcome as the skillset is transferable. This brings significant opportunity and welcomes creativity / best practice. Frequent travel to London office will be required. Chris.firstname.lastname@example.org 07884666351
- Aruba Data Centre Network Engineer
- Upto £500 a day
**Outside of IR35 contract** Aruba Data Centre Network engineer is required to start ASAP. You will be responsible for Data Center and Campus Network - Design and implementation of Aruba CX Switches, We are looking for an experienced data centre engineer who is happy to work remotely and autonomously Experience you will need to have, Solid Networking experience with good knowledge of -Routing & Switching - MP-BGP EVPN VXLAN, MPLS/VPLS, EIGRP, BGP, OSPF and Multicast, Experience with Aruba switches ideally the CX range Ideally SC cleared or able to become SC Cleared. This will be a 3 month rolling contract
- Network Engineer-
- 65000 plus bonus
An exciting opportunity has arisen with a global financal business that are looking for an experienced Network engineer with strong Firewall experience in particular Checkpoint You will be responsible for help to support and manage the network infrastructure both LAN/ WAN And VPNs and will have a focus on network secuirty (Checkpoint firewall and Security controls) This is a multi-Site environment with few thousand end users, As the business is growing so is the network so great opportunity to join an expanding business that will help cross-train you in both cloud and onsite solutions. They are looking for a strong network engineer with a mix of expereience o Experience with Azure networking managing VNETs, ExpressRoute, VPNs and other Azure network features such as NSG/MS loadbalancer is required. Working with Check Point firewalls in Azure is desirable. o In-Depth understanding of networking fundamentals including: Network topology, Data Centre Infrastructure systems, Layer 2/Layer 3 Switching, VLANs, Routing, VPNs, High availability protocols. o Demonstrable hands-on experience with Meraki Switches and wireless infrastructure, Arista software, Forcepoint Proxy (would be a strongly desirable), Citrix Netscaler, and Forescout CounterACT Location can be flexible, they are looking for someone who would be happy to do a hybrid working model 3 days at home 2 days in the office.