314-821-3237
Remote Support
Computer St. Louis logo
314-821-3237
Remote Support
  • Home
  • About
    • Team
    • SOC-2 Certified MSP
    • Certified Information Systems Security Professional (CISSP)
    • Areas Served
    • Testimonials
  • Services
    • Cloud Services
    • Cloud Repatriation Services
    • IT Solutions
    • Managed IT Services
    • Cybersecurity IT Compliance Services
    • VoIP Solutions
    • Managed Hosting
    • Telecom/ ISP/Solutions Brokering
    • Digital Marketing Services
    • Managed Print Services
    • Cybersecurity
      • Managed Email Security
      • Managed Endpoint Security
      • DNS and Domain Registration Security
      • Vulnerability Scanning
      • Data Encryption
      • User Training and Network Policies
      • Intelligent Roaming DNS Proxy for Endpoints
      • Multifactor Authentication and Password Management Systems
      • Managed Network Gateway Security
      • Managed Local and Offsite Backups
  • Careers
  • Resources
    • Blog
    • Free eBook
  • Contact Us
  • Support Request

Cyberthreats and the finance sector

by Nicole Russell | Mar 6, 2019 | Security | 0 comments

Scams and Alerts

The financial sector has long been heavily targeted by cybercriminals. Over the years, the number of attacks that involved extortion, social engineering, and credential-stealing malware has surged rapidly. This means that financial institutions should strive to familiarize themselves with the threats and the agents behind them. Here are seven new threats and tactics, techniques, and procedures that security professionals should know about.

Extortion
Distributed denial of service (DDoS) attacks, which are typically delivered from massive botnets of zombie computers or internet of things (IoT) devices, have been used to bring down banking networks. This occurs when a targeted server or system is overwhelmed by multiple compromised networks. It’s essentially like a traffic jam clogging up the highway, preventing regular traffic from arriving at its intended destination.

Some cybercriminals are relentless with DDoS attacks and follow them up with cyberextortion, demanding payment in return for release from costly downtime. Banks cannot defend against these attacks alone, so they rapidly share information among themselves through organizations such as FS-ISAC4 and rely upon the ability of their internet service provider to handle and redirect massive quantities of traffic.

Social media attacks
This happens when fraudsters use fake profiles to gather information for social engineering purposes. Thankfully, with new regulations such as the General Data Protection Regulation (GDPR), big companies like Facebook and Twitter have significantly enhanced their security and privacy policy with regards to their data handling practices. The unprecedented reach of social media is something companies cannot afford to ignore because of the possible implications a data breach can have on businesses.

Spear phishing
Spear phishing is an attack where cybercriminals send out targeted emails ostensibly from a known or trusted sender in order to trick the recipient into giving out confidential information. Over the years, hackers have upped their game and cast a bigger net, targeting unwitting employees to wire money. This attack is called business email compromise (BEC), where a fraudster will purport to be a CEO or CFO and request for large money transfers to bogus accounts.

Point-of-sale (PoS) malware
PoS malware targets PoS terminals to steal customer payment (especially credit card) data from retail checkout systems. Cybercriminals use a memory scraper that operates by instantly detecting unencrypted type 2 credit card data, which is then sent to the attacker’s computer to be sold on underground sites.

ATM malware
GreenDispenser is an ATM-specific malware that infects ATMs and allows criminals to extract large sums of money while avoiding detection. Recently, reverse ATM attacks have also emerged. Here, PoS terminals are compromised and money mules reverse transactions after money is withdrawn or sent to another bank account. In October 2015, issuers were mandated to shift to EMV or Chip-and-PIN system to address the weakness of the previous payment system.

Credential theft
Dridex, a well-known credential-stealing software, is a banking Trojan that is generally distributed through phishing emails. It infects computers, steal credentials, and obtain money from victims’ bank accounts.

Other sophisticated threats
Various data breach methods can be combined to extract data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATMs of cash.

Additionally, with the rise of cryptocurrency, cybercriminals are utilizing cryptojacking, a method that involves the secret use of devices to mine cryptocurrency.

The creation of defensive measures requires extensive knowledge of the lurking threats, and our team of experts is up to date on the latest security information. If you have any questions, feel free to contact us to find out more about TTPs and other weapons in the hacker’s toolbox.

Published with permission from TechAdvisory.org. Source.

Recent Posts

  • Seth Russell Named Among St. Louis’ “Top 100 to Know to Succeed in Business”
  • It’s a 5 Year Run! Computer St. Louis is the 2025 Top Cyber Security Firm in the Region!
  • Protect Mobile Communication: Guidance from the Cybersecurity and Infrastructure Security Agency (CISA)
  • 2024 Computer St. Louis Again Made STL’s Best IT Firm List
  • We Did It Again! Computer St. Louis is 2024 Top Cyber Security Firm in the Region!

Archives

  • March 2025
  • January 2025
  • December 2024
  • November 2024
  • January 2024
  • November 2023
  • July 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016

Categories

  • Apple
  • Awards
  • Business
  • Computer St. Louis
  • Google
  • Hardware
  • Healthcare
  • Office
  • Security
  • Social Media
  • Virtualization
  • VoIP
  • Web & Cloud
  • Windows

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Get started today

Contact Us

Ready to get started?

Let’s chat.

Call 314-821-3237

STAY IN TOUCH
  • Follow
  • Follow
  • Follow

Learn More

  • About
  • Contact
  • Client Portal
  • Referral Program
  • Testimonials

Learn More

  • Services
  • Careers
  • Remote Support
  • Partners

Contact Us

1650 Headland Drive
Fenton, MO 63026
United States
Phone: 314-821-3237

Hours: M-F 6am – 5pm



Privacy Policy



Terms and Conditions

© 2025 Computer St. Louis