A warning on a highly orchestrated fraud scheme targeting ATMs worldwide have been circulated by many international government agencies. The attack is carried out with the use of malware and cloned cards, and has the potential to cause millions of dollars in losses through multiple ATMs. Attackers can even alter the account balances and bypass security measures to make a virtually unlimited amount of money available for withdrawals.
Global Warnings:
Many central authorities across the globe have warned financial institutions about this global attack which has been termed as an ‘unlimited operation’, with similar attacks being imminent if no improvements are made to banking security systems.
Associated Incidents:
Cosmos Bank, the second largest cooperative bank in India was compromised where hackers reportedly breached servers and transferred more than $13.4 million. The attackers used a malware attack to implement a proxy switch in the bank’s main banking software to bypass the legitimate switching system to approve all fraudulent payments.
This incident occurred between the 11th-13th of August 2018 across approximately 28 countries, planned during the weekend as the hackers knew this would give them more time to execute their attacks without being detected. A total of $11.44 million was withdrawn on the 11th of August, in a time frame of around 2 hours. In addition, the remaining $1.98 million was transferred a to a Hong-Kong based account by the hackers through three unauthorized SWIFT global payment transactions on the 13th of August.
As sophisticated attacks improve, it is important for banks to stay up to date with their security precautions and employee training to prevent the spread of malware through internal systems and software.
Operation Process:
The scheme thrives by targeting banks that appear to have a lower than required budget for cyber security controls. Attackers use phishing attacks or attempt to find vulnerabilities with a bank or a payment card processor to allow them to place malware capable of accessing card information, manipulating balance and withdrawing limits on accounts, removing active fraud controls of the institution, and taking advantage of network access.
Once the attackers have access to the bank’s through the malware, they then distribute customer card information to their associates who can imprint the data onto gift cards or other reusable magnetic strip cards. These cards are then used on ATMs with the assistance of other functionalities of the malware, such as removing fraud controls and increasing the balance and withdrawal limits on the compromised cards. The attackers decide a specific time, most likely during a weekend, to implement these changes and a window of a few hours for fraudulent card holders to visit ATMs to withdraw large sums of cash.
Recommendations:
For Financial Institutions
2. Physical Measures
For ATM Users: