Taking Cybersecurity Lessons To The Bank

  /     /     /  
Publicated : 22/11/2024   Category : security


Taking Cybersecurity Lessons To The Bank


Lessons learned from frequent attacks make banks good role models in defending against bad guys



Banks are under attack -- not so much from gun-toting bank robbers, but from sophisticated cybercriminals.
Using programs such as Zeus to compromise customers PCs and siphon money from their bank accounts, cybercriminals stole or attempted to steal nearly $100 million in the first three quarters of 2009, according to the Internet Crime Complaint Center. Traditional bank robbers on average stole $4,029, and all the U.S. bank robberies in 2009 totalled about $35 million, according to the FBIs Uniform Crime Reporting (UCR) project.
Criminals are out there right now harming both the commercial account holders and financial institutions, Sari Stern Greene, president of Sage Data Security, told attendees last week at the Cybercrime Symposium 2010 in Portsmouth, N.H. And every time this happens, it harms the whole community.
Banks have the money, so they are todays targets. But they arent the only ones. Zeus and other malicious programs can easily be used to provide access to corporate PCs in other industries as well. For that reason, security managers should look to whats working -- and whats not working -- for the banking industry, say security experts.
Even the most educated customer may not have a defense against a targeted Zeus attack. For that reason, James Woodhill, founder of Authentify and a cybercrime policy expert, argues that education is not the answer.
In his presentation, Woodhill pointed out that it took a noncontroversial medical practice -- the use of penicillin -- nearly 30 years to spread out to general medical practitioners. Innovative defenses against cybercrime could take just as long, he says.
Education wont help a bit -- not at this scale, Woodhill says. It takes a long time to get information through to a large group of people.
But being aware of the problem can at least help consumers know their options, argues Sages Greene. The challenge is how to inform customers without scaring them away, she says.
Any company that allows users to access corporate data from laptops or home computers is importing risk, says Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.
Work from home equals risk at home, Warner says. If one of your employees has Zeus on their computer and they work from home, then so do their friends in the Ukraine.
Companies should have quarantine zones for home computers and laptops that have left the company premises until their security can be verified, Warner advises.
In the online world, attributing attacks is difficult, which makes online theft an attractive crime.
In the physical world, bank robberies are a low-percentage crime. They account for only about 2 percent of all robberies -- and arrests are made in 60 percent of the cases, according to the FBIs Uniform Crime Reporting (UCR) program. In the virtual world, criminals conduct attacks from safe havens where laws are vague or law enforcement agencies dont often pursue online criminals.
To prosecute cybercriminals, there must be attribution, experts say. But many companies want to clean up the crime scene -- their computers -- and sweep the incidents under a virtual rug. Companies should stop hiding these incidents and pursue investigations of attacks that use Zeus and other malware, experts say.
If you go in and delete malware off a computer, you dont know why they got the malware, you dont know where the malware came from, you dont know what it might have stolen while it was there, you dont know what data left your company because of the infection, and you dont know if the user understands how he got infected so he wont go do it again, UABs Warner says.
The current attacks on banks also show the limitations of both application whitelisting and intrusion detection that depends on blacklists, such as antivirus tools, observers say. Blacklisting cannot keep up with the changing threat, and whitelists are too hard to maintain in general-use computing environments, says James Lyne, a senior technologist for Sophos.
Any one control fails to deal with the threat, Lyne says.
Rather than make binary decisions, organizations should use blacklists and whitelists -- plus reputation and other information -- to help decide whether to allow access to a user, Lyne says. In addition, companies and banks need to use policies and controls to make security a foundation of their corporate culture, he says.
Banks are good at building process controls that help protect them against fraud, says Rick Simonds, CTO of Sage Data Security. You need controls, he says. You have a lot of controls on bank employees, and that helps them with security.
But while some banks have a lot of controls to detect fraud committed by insiders, they dont always monitor outside transactions in as much detail, Lyne says. A good defense should account for both the external threat and the internal threat.
Have a comment on this story? Please click Discuss below. If youd like to contact
Dark Readings
editors directly,
send us a message
.

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Taking Cybersecurity Lessons To The Bank