An analysis specific to Advanced Persistent Threats (APT)
Long-term attacks by various cyber attackers and APT groups infiltrating critical telecom infrastructures and financial systems to cause significant damage.
Advanced Persistent Threat
Unauthorized cash withdrawals from ATMs through ISO 8583 protocol.
Developed by a group originating from East Asia.
Detected in 2018.
Believed to have been active since 2016.
Infects ATM switch as malware.
Approves incoming requests without authorization.
Since 2018, it has started being detected by antivirus software.
Symantec bulletin: https://www.security.com/threat-intelligence/fastcash-lazarus-atm-malware
As of 15th October 2024, a new Linux variant of the FASTCash malware was discovered.
๐ There could be undetected APT malware within financial networks.
Known malware can be detected in some way, but what about the unknown ones?๐ฎ Question: Can we detect and stop unknown/undetected malware once activated?
Fighting malware with cybersecurity products
๐ซ Relying on the manufacturer to prepare a malware signature.
๐ซ Even if a signature is available, new variants of malware can emerge quickly.
๐ซ Defining these signatures for multiple products is exhausting.
๐ซ Cybersecurity products have limited support for financial protocols.
Collecting logs and trying to catch anomalies through analysis
๐ซ Looking at network traffic and trying to relate logs from as many servers as possible to see the big picture.
๐ซ Since malware exploits system vulnerabilities, it may not always generate logs.
โ๐ซ Network traffic analysis is essential, but it can’t detect malware operating locally.
๐ซ Collecting logs from both financial application servers and cybersecurity systems:
๐ Performance loss and delays in log transfer may occur.
Attempting to detect malware during online transactions by integrating with financial applicationsโ messaging.
๐ซ It’s impossible to detect malware using the limited information conveyed by the financial system.
๐ซ Integrating the fraud component with other cybersecurity components is highly challenging.
๐ While it is possible to monitor message traffic from the ATM network in real time, matching ATM messages with approval messages from servers is required.
๐ If the ATM dispenses cash without such an approval, an alarm should be generated.
๐ To do this with traditional methods, logging must be enabled on all servers. This leads to slowdowns and log increases.
The conventional approach will struggle significantly.
๐ค Alternative?
Airport 360-degree passenger security analogy
360-degree perspective applied:
โ Monitoring all components simultaneously in real-time without performance loss.
โ Scenario sets prepared by looking at the big picture.
๐ Bonus: Detection of anomalies in all flows using machine learning and AI algorithms.
โ Analyzing financial protocols and catching anomalies at the financial layer.
โ Collecting data without performance loss.
Records are collected by decrypting the data passing through the wire.
No additional load on servers and systems during collection, hence network performance remains unaffected.
Technically, the port mirroring feature of network devices is utilized. Traffic from each stage is mirrored to the analysis server.
Captured transactions are either flagged for monitoring or blocked with the FINANCIAL TRANSACTION GATEWAY.
With a single solution, monitoring the financial network end-to-end and conducting compliance checks for each transaction based on rule-based and AI-based controls.
Thus, protecting against threats like unauthorized cash withdrawals from ATMs by undetected malware.
You can protect your financial infrastructures against complex threats like APT by using INETCO products.
Contact us for more information
Start a WhatsApp chat here
See other contact options here