Carbanak Ring Steals $1 Billion from Banks - UCclouds.com
UCclouds Blog

Carbanak Ring Steals $1 Billion from Banks

“These types of attacks underline how difficult it is to discover bespoke pieces of malware using traditional signature based detection methods. Whitelisting applications on PCs and laptops could have detected the malware as an unapproved application. Yet whitelisting services are not immune from attacks themselves and may just become a single point of failure which when breached gives an attacker the ability to deploy undetectable malware.online-banking

 

UCclouds.com comment "Albeit that these latest malware are difficult to discover, what are some clues that we can look for that may indicate malware has been installed on pc's? 

 

I know I sound like a broken record responding to all of these recent breaches.  This breach should be identified by knowing what applications are being installed on a desktop.  As head of your IT department or the owner of a small business who uses desktops to run your business - when did you last scan for malware or virus?  Why would you consider a hosted desktop versus a local pc?  I can only answer for UCclouds.com - we monitor your hosted desktop environment (DaaS) in real time, all of the time.  We monitor for new installed applications, we notify the desktop owner and we confirm the validity of the installed application and take the appropriate steps. 

 

Additionally, we believe in realtime scanning, at the gateway level, before it reaches your desktop - although it is not 100% - it is very accurate."

 

The reconnaissance phase of attack and command and control traffic are weak points for the attacker since their activity will be visible on the network. Equally, unusual changes in bank balances will give away their presence. But organizations need to be routinely collecting data so that they can spot anomalies, and have the resources to conduct investigations to identify the root cause.

 

Only through constant vigilance and paranoia at being infiltrated can organizations hope to detect and react to attacks such as these. If an attacker knows your systems and procedures better than your own IT staff, it will be a tough fight to detect and unseat the attacker.

 

Forensic examinations take a long time to conduct. Once discovered it is quick and easy to announce that malware has been found, however it takes many weeks and months of forensic examination to identify exactly what which systems were affected, what was stolen and how far did the attack spread. I think what we are seeing here is the results of the in depth investigation being released.”

Search


Satisfied Clients

allied health benefits
corpsavers logo
allied health benefits-2
acp
azaa
ccfems
cfd
dsapgh
wca
racw
acme retail systems
hardwarelife.net
nbla
link II
laxsanity
kommersant 4x

Our Address:
1911 Grayson Hwy
Atlanta, GA 30017
Int'l: +1 (678) 701-5677
US: (800) 719-5405
Support HOTLINE: +1 (404) 665-3085
Hours of Operation:
Security (SOC): 24x7x365
Support (NOC): 24x7x365

Secure Cloud Hosting

UCclouds provides secure cloud hosting without sacrificing the redundancy and speed you would expect from an enterprise managed cloud hosting provider. If you're searching for a HIPAA Compliant Hosting or a PCI Hosting solution, look no further than UCclouds. Our secure managed hosting HIPAA and PCI solutions are compliant ready. Rely on UCclouds as your secure cloud hosting provider.

Data Center Locations

  • ATLANTA (ATL01)
  • SEATTLE (SEA01)
  • LONDON (LON01)