Friday, December 07, 2018
Kaspersky Lab researchers are revealing a new type of attack called “DarkVishnya” following a number of cyber-robberies targeting financial organizations in Eastern Europe during 2017 and 2018. To date, at least eight banks in the region have been affected by the cyberattacks, with estimated losses running into tens of millions of dollars.
Through Kaspersky Lab’s involvement in the incident response, researchers discovered that in each case the corporate network was breached through an unknown device, controlled by the attackers, which had been smuggled into a company building and connected to the network.
The attackers used three types of devices: a laptop, a Raspberry Pi (a single-board computer size of a credit card) or a Bash Bunny (a specially designed tool for automating and conducting USB attacks), equipped with a GPRS, 3G- or LTE- modem that allowed the attackers to penetrate remotely the corporate network of the financial organization.
Once the connection was established, the cybercriminals tried to gain access to the web servers to steal the data they needed to run RDP (remote desktop protocol) on a selected computer and then seize funds or data. This fileless method of attack included the use of Impacket, winexesvc.exe, or psexec.exe remote execution toolkits. In the final stage, the attackers used remote control software to maintain access to the infected computer.
“Over the past year and a half, we’ve been observing a completely new type of attacks on banks, quite sophisticated and complex in terms of detection,” said Sergey Golovanov, security expert at Kaspersky Lab. “The entry point to the corporate network remained unknown for a long time, since it could be located in any office in any region. These unknown devices, smuggled in and hidden by intruders, could not be found remotely. Additionally, the threat actor used legitimate utilities, which complicated the incident response even more.”
To protect against this unusual approach to digital robbery, Kaspersky Lab advises financial institutions to:
Read the full version of the report on Securelist.com.