The Thriving Malware Industry: Cybercrime Made Easy
The Thriving Malware Industry: Cybercrime Made Easy
The Thriving Malware Industry: Cybercrime Made Easy
Contents
1 Introduction
1 Seven basic steps for conducting malware-driven
financial fraud
7 Protecting against cybercrime with IBM Security
solutions
Introduction
The malware industry supplies all the components
cybercriminals need to easily perpetrate malware-driven
financial fraud and data theft. In todays virtual world, the
scope of organizations vulnerable to malware-driven
cybercrime is quite broad. In addition to banks and credit
unions that are subject to online banking fraud, financial fraud
can be perpetrated on insurance companies, payment services,
large e-commerce companies, airlines and many others.
Most attacks do not target an organizations systems directly,
but rather, their customer and employee endpoints. The reason
for this is that organizations have invested substantially in
multiple layers of security, such as firewalls, intrusion
prevention systems and anti-virus gateways, in order to filter
out cybercriminals on the perimeter. Conversely, for endpoint
security, organizations have leveraged anti-virus software,
which often detects less than 40 percent of financial malware.1
Consequently, cybercriminals focus efforts on conducting
malware-driven cybercrime, utilizing malware on user
endpoints to commit financial fraud and steal sensitive data.
revention s
ion p
yst
rus
em
t
n
I
virus gatewa
i
t
y
An
yp
Encr tion
Anti-virus
Pe
rim
ete
ty
uri
ec
t
oin
Firewall
urity
sec
rs
En
dp
Easy
Endpoint
user
Sensitive data
and applications
Easy
Difficult
Cybercriminals
IBM Software
kits are readily available for purchase on the open market, and
cybercriminals can take advantage of these tools to create exploit
code. However, not all cybercriminals possess the same level of
expertise or aptitude required to successfully use exploit code.
Instead, cybercriminals offer infection services that leverage
exploit code.
Step 5: Avoiding detection by anti-virus applications
IBM Software
Anti-virus checkers
Figure 2: Login with additional malware-injected fields (Generated Token Password and Wire PIN)
IBM Software
ZE
SE
C
Secure applications
against malware and
phishing attacks
E
UR
Adaptive
protection
VE
O
BL
CK
RE
Remove malware
from infected
endpoints
IBM Software
Cybercrime intelligence
crime logic
Fraud alert
Analytics and crime
management logic
Financial
institutions
Risk
assessment
AN
AL
Known
crime logic
Adaptive
protection
Unknown
BL
CK
Adaptive
protection
crime logic
OV
Adaptive
protection
E
UR
E
YZ
Online
threats
SE
C
Adaptive
protection
RE
IBM Software 11
Why IBM?
ibm.com/financing
1 MRG
http://www.mrg-effitas.com/wp-content/uploads/2012/06/MRG-Effitas-
Online-Banking-Browser-Security-Project-3.pdf
4 Peter
5 Amit
6 Amit
7 Amit
8 Amit
9 Amit
The client is responsible for ensuring compliance with laws and regulations
applicable to it. IBM does not provide legal advice or represent or warrant
that its services or products will ensure that the client is in compliance with
any law or regulation.
Statements regarding IBMs future direction and intent are subject to change
or withdrawal without notice, and represent goals and objectives only.
Statement of Good Security Practices: IT system security involves
protecting systems and information through prevention, detection and
response to improper access from within and outside your enterprise.
Improper access can result in information being altered, destroyed or
misappropriated or can result in damage to or misuse of your systems,
including to attack others. No IT system or product should be considered
completely secure and no single product or security measure can be
completely effective in preventing improper access. IBM systems and
products are designed to be part of a comprehensive security approach,
which will necessarily involve additional operational procedures, and may
require other systems, products or services to be most effective. IBM does
not warrant that systems and products are immune from the malicious or
illegal conduct of any party.
http://www.trusteer.com/blog/post-transaction-attacks-expose-weaknesses-
fraud-prevention-controls
WGW03046-USEN-01