430,000 people hit with financial malware
Financial malware, that is malware that targets finances, cryptocurrencies and web-money services, has increased by 7% from the same period last year, according to new research from Kaspersky.
New research finds that 430,000 users faced this issue in the first half of 2019. Of this, more than a third (30.9%) were corporate users, which is double the figure discovered in the first half of 2018 (15.3%).
Financial malware, commonly known as banking Trojans, is aimed at stealing finances and financial data, as well as providing threat actors with access to users and financial organisations assets and machines, Kaspersky says.
According to the company, these threats have always occupied a significant part of a threat landscape, as finance is the most common motivation for cybercriminals and fraudsters.
Kaspersky data on new samples of these threats highlight that malware aimed at stealing funds is active and dangerous, especially when it comes to corporate environments.
This is due to the fact that most corporate networks usually rely on connected devices, and if one is compromised then the whole entity may be under threat.
According to the research, typical attack vectors for malware are spam emails and phishing web pages. Web pages generally appear to be legitimate websites, but are created by threat actors in an attempt to steal credentials, bank card details or other types of sensitive information, Kaspersky says.
According to the report, during the first half of 2019, more than 339,000 phishing attacks from web pages disguised as landing pages of large banks have been detected.
The research also identified the most popular banking Trojan families that were used to attack corporate users.
Four-in-ten (40%) financial threats on corporate users came from the RTM banking Trojan – one of the most dangerous types of banking malware for businesses in 2018 Kaspersky says.
RTM is followed by the Emotet banking Trojan at 15%. This threat can be particularly damaging as once it gets inside the entity’s network perimeter, it can self-distribute through vulnerabilities in unpatched devices and then download extra threats onto the victim’s device, Kaspersky says.
Trickster banking Trojan is the top three identified malware, with 12% of discovered threats.
For private users, the situation was found to be different. The list of malware that attempted to attack them is topped by Zbot malware (26%), which steals credentials with the option of remote control by threat actors, followed by RTM and Emotet.
In 2018 RTM was almost entirely aimed at organisations, while figures from the first half of 2019 show that this malware is now reaching a significant share of ordinary, domestic users, according to Kaspersky.
Kaspersky security researcher Oleg Kupreev says, “We expect to see a rise in the number of attacked users in the second half of 2019. Usually, we see a rise in malicious activity after the holiday season, when people are using their devices less than usual and therefore are less likely to fall a victim to threat actors.”
“We urge everyone to be extra careful with all banking and finance-related operations that they perform online and remain vigilant,” says Kupreev.
To protect your business from financial malware, Kaspersky security specialists advise introducing cybersecurity awareness training for employees, installing the latest updates and patches for all software, forbidding the installation of programs from unknown sources, implement EDR solutions for endpoint level detection and remediation, and finally integrating Threat Intelligence into your SIEM and security controls in order to access the most relevant and up-to-date threat data.
On education, Kaspersky says it is important to train particularly those who are responsible for accounting and teach them how to distinguish phishing attacks. For instance, do not open attachments or click on links from unknown or suspicious addresses.
Kaspersky recommends private users always install security updates as soon as possible, do not install software from unknown sources, and use a reliable security solution.
- Lead CyberArk deployment Consultant
- Upto £80,000 plus benefits
CyberArk Consultant is needed to be responsible for leading the deployment of CyberArk solutions for this expanding IT services business, You will work with customer both pre and post sales, getting involved in CyberArk Solution Design, helping to create CyberArk Strategic Roadmaps, on-boarding accounts, product and process integration into the CyberArk Solution and Proviso of Installation and technical Documentation. We are looking for this individual to have experience in: Installation of CyberArk PAS for V11.X and V12.X (Vault, DR Vault, Central Policy Manager and Password Vault Web Access) Upgrade of CyberArk from V9 and V10 (Vault, DR Vault, Central Policy Manager and Password Vault Web Access) Installation and Upgrade of Privilege Session Manager and Privilege Session Manager Proxy As some of your client will be government site, all individual will need to be put through SC clearance, therefore you must be eligible to receive this and happy to be put through(With a British Citizen or to have lived in the UK for the past 5 years) We are unable to provide work visa sponsorship for this opportunity
- Senior Business Analyst - Outside IR35 Contract, SC Clearance Required, London
- £400 per day outside IR35
Senior Business Analyst - Outside IR35 Contract, SC Clearance Required, Based in London Project- to engage with colleagues and stakeholders to investigate and model business functions, processes, information flows and data structures, using a range of business analysis techniques. • You will translate the solution to the business problem into detailed requirements by creating user stories and well-defined acceptance criteria. • Elicit end-to-end business requirements for a live cross-government service • Working across the Government departments to bring together varied business and operational outcomes to form a holistic overall set of service requirements Current SC clearance is required. As is the ability to travel to London.
- DV cleared CCP Senior IA Architect Contract. 12 month Outside IR35
- 600 per day Outside IR35
DV cleared CCP Senior IA Architect Contract. 12 month Outside IR35. £600 MOD experience (Secure by Design, Accreditation, management) / CADMID project life cycle. Working within and across programmes across Land, Air and Fleet. Meng / Ceng. Ability to travel where as and where needed across the M3 / M4 corridor
- Illumio Engineer - CONTRACT. EUROPE
Engineer with hands on Illumio needed for 6 month contract. Ideally based in Sweden, but would consider the right individual to deliver a hybrid role (Occasional travel to Sweden will be required). Connecting services in Illumio, rollout of the agents (VEN). Experience with Illumio Core, endpoint, cloudsecure Looking to start ASAP