Skip to content

ESET Research discovers close cooperation among Latin American financial cybercriminals

BRATISLAVA, PRAGUE – ESET researchers have today published a white paper detailing their findings on the interconnected nature of Latin American banking trojan families. Even though Latin American banking trojans can be looked upon as one homogeneous group of malware, ESET reports that multiple distinct malware families can be recognized. At the same time, ESET researchers have discovered a surprising number of indicators of close cooperation among Latin American banking trojan authors. Despite the term “Latin American,”  some of the trojans have been targeting Spain and Portugal since late last year. The white paper was first published during the VB2020 localhost conference.

“Over the past year, we have been publishing an ongoing blog post series about Latin American banking trojan families. These blog posts mainly focus on the most important and interesting aspects of these families,” says Jakub Souček, one of the researchers working on Latin American financial cybercrime. “At the VB conference, we looked at these families from a high-level perspective. Rather than examining details of each family and highlighting their unique characteristics, we focused on what they have in common.”  

The first similarities ESET spotted were in the actual implementation of these banking trojans. The most obvious are the practically identical implementations of the banking trojans’ core functionalities and attack techniques via fake pop-up windows carefully designed to lure victims into providing sensitive information. Besides that, these malware families share third-party libraries, generally unknown string encryption algorithms, and both string and binary obfuscation techniques.

Other similarities can be observed in malware distribution. The trojans usually check for a marker used to indicate that the machine has already been compromised and download data in ZIP archives. ESET also observed identical distribution chains distributing several different payloads and shared execution methods.

“Additionally, different families use similar spam email templates in their latest campaigns, almost as if this was a coordinated move,” says Souček. “Since we don’t believe it to be possible that independent malware authors would come up with so many common ideas – and, moreover, since we don’t believe one group to be responsible for maintaining all these malware families – we must conclude that these are multiple threat actors closely cooperating with each other.”  

For more technical details about this spyware, read the white paper “LATAM financial cybercrime: Competitors in crime sharing TTPs” on WeLiveSecurity. Make sure to follow ESET Research on Twitter for the latest news from ESET Research.  

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.

The OT & IoT Cybersecurity Feed – October 2020

News Post SCADAfence Main-1

Hey, I’m SCADAGirl.

I’m a cybersecurity superhero that ensures that OT & IoT networks are safe.

Here is my commentary on the latest headlines in OT & IoT security.

News Post SCADAfence2

ICS Advisory (ICSA-20-240-01) Red Lion N-Tron 702-W, 702M12-W

SCADAgirl SCADAfence Research – ICS Ethernet Switches used in Industrial Networks by manufacturer Red Lion are exposed to Remote Command Injection. The switches types are 702-W and 702M12-W. Read More 


News Post SCADAfence Oct 1-1

Critical Vulnerabilities Expose MoFi Routers to Remote Attacks

SCADAgirl SCADAfence Research  – IOT Routers made by MoFi network are vulnerable to Remote Code Execution vulnerabilities. The series affected is MOFI4500, which includes several routers which includes WIFI and 4g capabilities. Companies utilizing such routers for mobile or remote connectivity should check their devices for updates. Read More


News Post SCADAfence Oct 2

BLURtooth Vulnerability Lets Attackers Defeat Bluetooth Encryption

SCADAgirlSCADAfence Research – IOT BLURtooth vulnerability exposes new generations of bluetooth-enabled devices to MITM attacks. Academic researchers have discovered that certain implementations of Bluetooth 4.0 to 5.0 suffer from weak key generation and thus allow MITM to take place. Read More


News Post SCADAfence Oct 3

Netwalker Ransomware Hits Pakistan’s Largest Private Power Utility

SCADAgirlSCADAfence Research – Netwalker Ransomware hits the largest private power company in Pakistan. The ransomware caused disruption in billing and online services. Read More 


News Post SCADAfence Oct 7

Windows Zerologon PoC Exploits Allow Domain Takeover. Patch This Now!

SCADAgirlSCADAfence Research – A PoC was released for the Zerologon vulnerability, which allows attackers to gain Domain Admin privileges and take over windows domain environments. The vulnerability CVE-2020-1472 was patched by Microsoft in the last August update. The vulnerability occurs when an attempt to login as a domain administrator is made, and a spoofed response is sent to the client telling the login succeeded. The vulnerability relies on the fact that it is possible to fallback to unencrypted RPC, and after that, using a security flaw found in Netlogon AES-CFB8 cryptographic negotiation. Please read more for the full article & the POC code. Read More 


News Post SCADAfence Oct 8

Ransomware Attack at German Hospital Leads to Death of Patient

SCADAgirl SCADAfence Research – Ransomware attack at a German hospital leads to the death of a patient. The ransomware attack lead to the situation where emergency care could not occur at the hospital, and a patient in a life-threatening condition died after being forced to go to a more distant hospital. Read More


News Post SCADAfence2

ICS Advisory (ICSA-13-011-01)

SCADAgirl SCADAfence Research – Devices running CoDeSys are vulnerable to read/write any files on devices running it. Also devices running CoDeSys require no authentication by default, making attackers able to change the device configuration. Read More


News Post SCADAfence Oct 9

The Windows XP Source Code Was Allegedly Leaked Online

SCADAgirl SCADAfence Research – Windows XP Source code was leaked online, and can be downloaded by a torrent. The leaked source code may help attackers find new, yet unknown, vulnerabilities in, even new, Windows operating systems. Read More 


News Post SCADAfence Oct 10

Ransomware Hits US-Based Arthur J. Gallagher Insurance Giant

SCADAgirl SCADAfence Research – US-based Arthur J. Gallagher (AJG) global insurance brokerage and risk management firm confirmed a ransomware attack that hit its systems. Read More 


News Post SCADAfence Oct 12

UHS Hospitals Hit by Reported Country-Wide Ryuk Ransomware Attack

SCADAgirl SCADAfence Research – UHS hospitals hit by reported country-wide Ryuk ransomware attack, shutting down a few of its hospitals.

“After 1min or so of this the computers logged out and shutdown. When you try to power back on the computers they automatically just shutdown. “We have no access to anything computer based including old labs, ekg’s, or radiology studies. We have no access to our PACS radiology system.” Read More

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

Managing Your Unmanageable OT and IT Infrastructure

As industrial systems become increasingly connected to IT, Cloud and ERP systems, they become increasingly exposed to cyber threats such as ransomware. In fact, cyber threats for industrial control systems (ICS) are on the rise.

Asset owners are often operating legacy equipment, which contains a large number of vulnerabilities, including unpatched industrial devices, unsupported operating systems like Windows XP and Windows 7, and others. Although this equipment may be productive for now, it is not secure, and the level of risk rises with time.

SCADAfence runs into these problems constantly with their customers as their industrial cybersecurity products were designed to help their users get through these security obstacles, such as aging equipment, the adoption of IIoT devices in Industry 4.0, and visibility gaps. As SCADAfence helps their customers drive their security and regain control over their network, here are some of the problems that they see in their industrial environments.

The Challenges SCADAfence Sees In Industrial Networks Today

Asset management is often managed with cumbersome Excel sheets, which is often inaccurate, and outdated. Security teams and OT operators need to know about real-time deviations in network traffic to account for cyberattacks like Malware or Ransomware, which can spread in minutes.

When having SCADAfence installed passively in their network, their customers often discover tens to hundreds of “shadow” OT devices or devices that the operators didn’t know existed. Even worse, many of the unaccounted for devices may be connected to the internet.

Four Ways to Solve These Constant Industrial Network Challenges

1. Maximum Rate Bandwidth for Increased Data Analysis  The SCADAfence Platform was built to handle large amounts of traffic. Utilizing Garland Technology’s visibility solutions, they read every bit, byte, and packet using full deep packet inspection (DPI) to have the highest detection rate in the industry. Most industrial network monitoring platforms don’t have the bandwidth to process this sizable data.

2. Setting an Operational Baseline with Advanced AI Capabilities  SCADAfence also offers a unique Micro Granular Baseline technology. This technology learns every device’s granular traffic characteristics. Providing the most accurate detection mechanism, this unique technology helps their customers to dramatically reduce false-positives without the need to reconfigure the baseline, even with operational changes. Customers gain precise and reliable results in hours vs weeks, with continuous intelligence utilizing advanced AI capabilities.

3. Instant Analytics and Reporting for Governance and Compliance   The SCADAfence Governance Portal, provides fully automated compliance dashboards and detailed compliance reports, which allows their customers to view status trends and comparisons over time. These accurate and up-to-date compliance status are based on real network traffic data analytics that tracks and measure industrial regulations and organizational best practices.

This is especially important to critical infrastructures, which have to meet certain frameworks and compliances to work under the correct guidelines. This tool ensures that their customers can remain fully compliant with industrial standards such as NERC-CIPIEC-62443NISTISO-27001, NIS NCSC, NIST CSF, and others – including internal policies that can be set up by their own organizations.

Taking in the packet traffic from Garland’s network TAPs, SCADAfence’s stand-alone monitoring will passively scan the traffic from every appliance with the utmost industry standards. Users can choose the industry standard that they want to be compliant with and the Governance Portal will show updated real-time reports in clear detail. SCADAfence finds that their customers find this incredibly valuable and time-efficient.

4. 100% Packet-level Network Visibility with Garland Technology  It’s very important with a network monitoring solution to not be intrusive in your OT process. SCADAfence offers continuous passive OT network monitoring that provides visibility, automatic asset discovery, inventory management, risk management, and threat detection is needed to capture the current operational behavior of the environment.

Generating 100% packet-level visibility with Garland’s visibility solution, SCADAfence is able to render critical insights to detect and provide alerts on cybersecurity and operational incidents like suspicious activities, exposures, malware attacks, and operational alerts such as service availability, and misconfigurations. This allows users to gain unique visibility into remote access connections and correlate OT actions to IT accounts.

For more information visit the Garland Technology and SCADAfence joint solution.  Looking to add visibility to your industrial environment, but not sure where to start?  Join us for a brief network Design-IT consultation or demo. No obligation – it’s what we love to do.

The original post can be found on garlandtechnology.com

About Version 2 Digital

Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.

Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About SCADAfence
SCADAfence helps companies with large-scale operational technology (OT) networks embrace the benefits of industrial IoT by reducing cyber risks and mitigating operational threats. Our non-intrusive platform provides full coverage of large-scale networks, offering best-in-class detection accuracy, asset discovery and user experience. The platform seamlessly integrates OT security within existing security operations, bridging the IT/OT convergence gap. SCADAfence secures OT networks in manufacturing, building management and critical infrastructure industries. We deliver security and visibility for some of world’s most complex OT networks, including Europe’s largest manufacturing facility. With SCADAfence, companies can operate securely, reliably and efficiently as they go through the digital transformation journey.

×

Hello!

Click one of our contacts below to chat on WhatsApp

×