Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/11/2016
04:10 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
100%
0%

Symantec Warns Of Second Group Targeting SWIFT Network

Those behind the Odinaff Trojan are using tools and infrastructure associated with the infamous Carbanak cybercrime group, security vendor says

Cybersecurity firm Symantec Corp. this week identified a group of malicious hackers targeting the SWIFT payments network in the same manner that another group did earlier this year when looting tens of millions of dollars in brazen online bank heists.

Since January this year, the newly identified group has been using a sophisticated Trojan called Odinaff to try and break into the networks of multiple organizations, many of them in the financial services and banking sectors. Organizations providing support services to these companies have also been targeted.

Evidence gathered about the Odinaff group shows that it has mounted attacks on users of SWIFT, Symantec said.

The Odinaff attacks are similar to those carried out by a cybercriminal group that stole $81 million from the Bangladesh central bank earlier this year by exploiting weaknesses in the interface between the banks’ systems and the SWIFT network.

In the earlier attacks, the threat actors used tools, associated with a cybercrime group called Lazarus, to initiate fraudulent money transfer transactions from target banks and then later to conceal evidence of the illegal activity. The same attacks were played out across multiple banks, resulting in considerable millions of dollars in losses for the target banks.

Symantec said it has found evidence showing the Odinaff group targeting SWIFT users as well as using malware to conceal fraudulent transactions. “The tools used are designed to monitor customers’ local message logs for keywords relating to certain transactions,” it said. “They will then move these logs out of customers’ local SWIFT software environment,” to conceal evidence of illegal activity.

Despite the similarity in approach, there is nothing to suggest that the Odinaff group is linked to the group that carried out the earlier attacks on the Bangladesh bank and other financial institutions, Symantec said.

The security vendor described Odinaff as malware used in the initial phase of an attack to gain a foothold on a target system and to provide a persistent presence on it. The malware is being used to install other sophisticated tools on compromised systems.

At least some of the tools and the rogue infrastructure that the Odinaff group is using are similar to tools used by the infamous Carbanak group that has long targeted financial institutions. “This new wave of attacks has also used some infrastructure that has previously been used in Carbanak campaigns,” Symantec said in its alert.

The Odinaff attacks that Symantec investigated appeared to require a large degree of hands-on effort and the deployment of purpose-built back doors and tools to target computers of specific interest to the operators of the campaign. The attackers appear to have invested heavily in developing, deploying, and coordinating the use of multiple tools during targeted attacks, Symantec said.

Jon DiMaggio, senior threat intelligence analyst with Symantec Security Response, says there are multiple similarities between the Odinaff and Carbanak operations to suggest a link between the two.

Aside from similar targets, three command-and-control (C&C) IP addresses have been connected to previously reported Carbanak campaigns, he says. One of them was used in an intrusion at Oracle’s MICROS POS network earlier this year - an attack that was linked to Carbanak. Russian and Cyrillic text in certain strings of the malware also suggest the operators of the two groups have the same origins, DiMaggio says.

“The Odinaff attackers could be part of Carbanak, but it is also possible that the two groups are only loosely affiliated.”

Related stories:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The State of Email Security and Protection
Mike Flouton, Vice President of Email Security at Barracuda Networks,  11/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprise
Assessing Cybersecurity Risk in Today's Enterprise
Security leaders are struggling to understand their organizations risk exposure. While many are confident in their security strategies and processes, theyre also more concerned than ever about getting breached. Download this report today and get insights on how today's enterprises assess and perceive the risks they face in 2019!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18881
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows unauthenticated reflected XSS in the dashboard user profile.
CVE-2019-18882
PUBLISHED: 2019-11-12
WSO2 IS as Key Manager 5.7.0 allows stored XSS in download-userinfo.jag because Content-Type is mishandled.
CVE-2019-18873
PUBLISHED: 2019-11-12
FUDForum 3.0.9 is vulnerable to Stored XSS via the User-Agent HTTP header. This may result in remote code execution. An attacker can use a user account to fully compromise the system via a GET request. When the admin visits user information under "User Manager" in the control panel, the pa...
CVE-2019-18874
PUBLISHED: 2019-11-12
psutil (aka python-psutil) through 5.6.5 can have a double free. This occurs because of refcount mishandling within a while or for loop that converts system data into a Python object.
CVE-2019-18862
PUBLISHED: 2019-11-11
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.