<img src="https://certify.alexametrics.com/atrk.gif?account=kla4t1zDGU20kU" style="display:none" height="1" width="1" alt="">
Contact us
Request demo →
Contact us

How banks can avoid biting in a phisher's hook

by Cybersprint Blog 16 Dec 2019

How do you rob a bank in 2019? Forget balaclavas, safecrackers and getaway cars. All you need is a laptop, some software and a little imagination. The result? A phishing “business”, which fools online banking users into thinking they are logging into their account, when they are actually giving away their login details to cybercriminals. Bank customers have always been the easy target in this kind of scam. A report from Kaspersky Labs found that almost 50% of phishing campaigns used this method. But as banks have improved their fraud prevention measures to protect their customers, the focus of the phishers has broadened to include the banks themselves.

Targeting high profile individuals

In particular, cyber criminals have adopted so-called “spear-fishing” or “whaling” approaches, whereby senior executives are targeted or impersonated in order to access significant sums of money.

Here’s how that works. Attackers will first create a detailed profile of a high-level executive, based on information they can find from a variaty of online sources. These are called Open Source Intelligence (OSINT) and include information from social media platforms, presentations, emails, and more. 

Having the intelligence they need, attackers can start their scam. When they know a high-level executive loves to play golf or has a certain breed of dog, for instance, they can create a message with a malicious link or attachment, tempting the target to click it as it already sparks their interest. When they do, malware could automatically be installed, or their login credentials can be copied and abused. 

When impersonating an executive, also known as CEO-fraud, cyber criminals send an official-looking email to someone with the power to authorise the transfer of funds, ordering them to pay money to a certain account. The instructions usually pressure the employee to act quickly, and since employees often lack the direct contact with senior executives, they don’t verify the message’s authenticity. They can easily fall prey to the scam and transfer millions to a foreign account. This is exactly what happened to Belgian bank Crelan, which lost €70 million ($75.8 million) when a hacker posed as the CEO and convinced someone in the finance department to wire the funds overseas.

Fighting back against phishing

Banks need to be relentlessly vigilant in protecting themselves against phishing attacks. Here are some of the things they need to be able to identify:

Phishing setup indicators: To collect login details or other personally identifiable information (PII), cyber criminals first need to prepare their scam. The process of setting up a phishing website includes traceable tasks such as domain registration, purchase or ownership transfer, and new content publication. Continuous monitoring for such traces is required to flag these kinds of activities as soon as they occur. This may even make it possible to take preventative action before the phishing site becomes active. 

Attack preparations: Attacks on high profile banks and executives require a lot of planning and collaboration between those responsible. Conversations taking place on the (dark) web, the theft or selling of data or devices, social media chats and many other factors can indicate that an attack is imminent. Of course, recognising these indicators might not always help prevent the attack. Nevertheless, the heightened situational awareness can help banks be better prepared and take remedial action more quickly, thereby minimising the overall impact.

Exposed data: Just like most other organisations, every bank has: unpatched systems; employees posting information, installing applications or sending files that they shouldn’t; and malicious parties trying to hijack social media conversations or coax sensitive information from legitimate users. All of these entry points can be used as stepping stones into the bank's systems. The ability to identify the open doors is critical for banks to maintain data integrity and security.

How digital risk protection solutions can help

Digital Risk Protection or DRP solutions are a relatively new but increasingly essential element in any bank’s cyber security strategy. The digital footprint monitoring that they provide can, for example, help banks recognise and raise the alarm about:

  • Domain names that look very similar to that of the brand, but which don’t support an active website. For instance, the letter ‘ŋ’ might look like a normal ‘n’ in a longer URL;
  • Malicious domains intended to support a phishing or malware campaign. These can be detected through their presented content, such as brand logo, slogan, font, and colour recognition;
  • The highest priority threats, in terms of potential impact from vulnerabilities or the targeting of executives, based on a transparent scoring system.

These insights help banks identify the range of phishing threats they face, and empowers them to make better decisions about the type and prioritisation of preventative action. Would you like to know more about phishing, and how to protect your organisation? Read our Phishing whitepaper here

Are you looking for a way to protect your bank more effectively against all sorts of phishing attacks? We can help you map your digital footprint and its vulnerabilities, empowering you to regain control over your digital assets. Click below to request your free Quickscan. 

Request a demo

Digital Footprint compared to 5 security technologies

In this blog, we'll cover our Digital Footprint approach compared to five existing security approaches. What methods do they share? And where do they complement each other? We'll have a look at these techniques:  1. Asset discovery 2. Vulnerability management 3. Penetration testing 4. Red teaming 5. Supplier security governance Each has some touch points with Digital Footprint. For this comparison, we build on our earlier explanations of the concept. In the first blog, we gave our definition and summarised what drives the need for the solution. You can read our second blog to see how Digital Footprint is positioned with regards to External Threat Intelligence.

read more

Digital Footprint in External Threat Intelligence

Every IT Security team needs access to some sort of Threat Intelligence (TI). It is an umbrella term for the collection of information and data on security risks and the threat actors behind them. Together, this information helps to prevent or limit incoming threats, and provides insights when mitigating an incident or event in Incident Response scenarios. As a deepening of the topic, External Threat Intelligence (ETI) mainly focusses on the combination of internal risk data with threat intelligence originating from outside of the organisation.

read more

CEO insights: 3 trends for 2021's cybersecurity

The year 2020 has brought us many different events and experiences, all with varying levels of impact. Physical events have impacted the digital world, and cybersecurity incidents have had their effect on the way we live. Remember the Citrix incident early this year? That prohibited many from working remotely, resulting in massive rush hours traffic jams as everyone travelled to the office. Almost the exact opposite of what COVID-19 has done to our way of working. But what does this mean for 2021's cybersecurity? And what evolving threats should you prepare for? Three cybersecurity CEOs share their views, predictions, and tips. 

read more

Do you have a question?

Our experts have the answers

Contact us