E-CommerceALERT.com is part of the Bennett Gold LLP web site network.
LINK TO: Bennett Gold LLP, Chartered Professional Accountants, home page.
LINK TO: E-CommerceALERT.com Home Page.
CLICK to GO BACK to Main Page.

Research and retrieval of news articles by:
Bennett Gold LLP, Chartered Professional Accountants

Effective December 31 2012, articles are no longer being updated on this web site.
The site is now maintained as an historical archive, covering notable e-commerce news articles from the period 1999 to 2012.


Source: ITbusiness.ca

Posted on August 27, 2009

      In an alert to its members earlier this month, NACHA-the Electronics Payments Association said that attackers are increasingly stealing online banking credentials, such as usernames and passwords, from small businesses by using keystroke-logging tools and other malware.

      The cybercriminals are using the stolen credentials to "raid" and "take over" corporate accounts and initiate unauthorized transfers of funds via electronic payment networks. NACHA oversees the Automated Clearing House (ACH) electronic payments network.

      A similar alert was sent confidentially last Friday to members of the Financial Services Information Sharing and Analysis Center, according to a story published in the Washington Post yesterday. According to the Post, the alert identified organized cybercrime groups in Eastern Europe as being predominantly responsible for illegally siphoning millions of dollars off of corporate accounts and sending the money overseas via popular money and wire transfer services.

      The Financial Services Information Sharing and Analysis Center was formed by major financial services firms to share information about potential cyber and physical threats to their companies.

      NACHA's alert said that the cybercrooks are apparently targeting small businesses because of their relative lack of strong authentication procedures, transaction controls and "red flag" reporting capabilities.

      In some cases, the alert said, attackers trick people who work at small businesses into visiting phishing sitesthat have the same look and feel as those of the small businesses' financial institutions. Once they reach a phony site, the employees log in using the credentials they normally use for the legitimate site.

      In other instances, keystroke loggers and data-stealing malware programs are downloaded onto corporate systems via e-mail attachments, and cybercriminals then use them to capture the usernames and passwords that employees use to log onto banking Web sites.

      Some of the malware tools can send alerts to the crooks when a victim has logged onto the Web site of a financial institution. The tools then fool the user into thinking the banking site is not responding while a cyberthief quietly conducts transactions in the user's name, the alert noted.

      In a "worst-case scenario" such compromises could lead to a complete takeover of a business's account, NACHA said. "To the financial institution, the credentials look just like the legitimate user," the NACHA alert said. Thus the attackers can gain access to all account details and activity. The crooks use the confidential credentials to quietly transfer funds to accounts set up by accomplices and unwitting "mules." Often, the stolen funds are ultimately sent to accounts overseas.

      Because of a relative lack of account monitoring at many small businesses, unauthorized transfers can go unnoticed until it is too late to stop them, NACHA said. NACHA did not respond to requests for comment on its alert.

      Nick Holland, an analyst at Boston-based Aite Group LLC, a consultancy that focuses on the financial services industry, said the theft of banking credentials from small businesses has been an issue for some time.

      But the use of the ACH network to illegally transfer substantial amounts of money out of corporate accounts in particular is a growing issue, he said. A survey of banks by Aite Group last year found the ACH network to be a potential security concern, Holland said. Criminals are targeting electronic payment networks because many businesses, especially smaller ones, have relatively few controls for preventing misuse of such channels to transfer funds out of an account, he added.

      While financial services companies have put considerable emphasis on fighting credit and debit card fraud, there has been somewhat less of a focus on implementing the same kind of controls on electronic payment channels, he said. For instance, while an unusually large credit card transaction might trigger a fraud alert, a crook could initiate a similar ACH transaction without anyone "batting an eyelid" in many cases, Holland said.

      Once an attacker gains access to a company's banking credentials, transferring money out its corporate account using ACH transfers is not overly difficult, said BC Krishna, CEO of Memento Inc., a Concord, Mass.-based company that provides fraud detection services to financial firms. In fact, a harder task for those behind such thefts often is finding accomplices and "mules" willing to receive the stolen funds, he said.

      Many of the businesses targeted in such attacks do not know how to defend themselves and have few mechanisms for detecting cybertheft, he added.

      Some of the malware tools used in such thefts have become increasingly sophisticated, allowing users to remain undetected while stealing the credentials, said Joe Stewart, director of malware research at SecureWorks Inc., an Atlanta-based provider of information security services.

      He cited threats like the especially virulent Clampi Trojan. Believed to have infected tens of thousands of systems worldwide, the Clampi Trojan is designed to infect a machine and then push itself out to every other machine on a domain via a legitimate Windows administrative tool, he said.

      Some tools are capable of using the victims' own browser to carry out a transaction, making the bank systems think they are dealing with a legitimate user, he said. Victims can get infected by such Trojans simply by visiting Web sites where the malware has been planted, or via e-mail attachments and even instant messaging systems, he added.

      Companies that want to mitigate the risk of such theft need to ensure that ACH and wire transfer payments are always initiated under dual controls, NACHA said in its alert.

      The organization also recommended the use of strong two-factor authentication to make it harder for someone to gain unauthorized access to an account. Alerts on unusual activity - such as a sudden transfer of money to a newly created account, or a sudden increase in the number of transactions in an account - can also help flag such fraud early, Krishna said.

CLICK to GO BACK to Main Page.

E-Commerce Alerts are issued by Bennett Gold LLP, Chartered Professional Accountants as situations develop. Bookmark this site and check back often. Our e-mail address is: info@BennettGold.ca

In accordance with United States Code, Title 17, Section 107 and Article 10 of The Berne Convention on Literary and Artistic Works, the news clippings on this web site are made available without profit for research and educational purposes.

Final Entries

LINK TO: Bennett Gold, Chartered Professional Accountants: A Licensed Provider of WebTrust Services.

WebTrust Is Your
Best Defense
Privacy Breaches.

Get WebTrust
Working For
Your Site.