keyboard_arrow_down
SmallBusiness.com Guide to Business Computer and Tech Security
January 20, 2016 SmallBusiness.com
by SmallBusiness.com in ComputersSecurity
How to Avoid a New Cyber Attack Attempting to Access Small Business Bank  Funds

Cyber criminals are using a new attack against hundreds of small business employees.


Research released today from the security firm, Symantec, found that criminals are using a new attack against hundreds of small business employees in the U.S., U.K. and India. The emails contained publically available “remote access trojans” (RATs) – malware that allowed the criminals to use infected computers to steal money from the bank accounts of the small businesses. As we shared last September, banks are not required to refund money stolen from small business accounts, making the attack an especially dangerous if successful.


How the attackers do it

  • The attackers rely on social engineering (see glossary, below)
  • Attackers send legitimate-looking, but malicious, emails to small business employees responsible for accounts and fund transfers.
  • The email appears to be from someone the email user knows.
  • The emails include archive file attachments, usually with the .zip extensions.
  • If the employee opens the file, their computer is infected with either Backdoor.Breut or Trojan.Nancrat.
  • Through these infections, the attackers can access the webcam and microphone, log keystrokes, steal files and passwords, and more.
  • The attackers have been observed using the targeted employee’s privileged access to transfer money to an account under their control.
  • Once a computer is compromised, the attackers spend time assessing it to find out how to steal the money.
  • In some cases, attackers have been known to even download manuals to figure out how to use certain financial software.
  • After they are finished with the computer, they return to sending emails to other targets.

Social Engineering | Attackers attempt to “con” an individual to share information or click-on buttons rather than attempting a technical breach of data
Spoofing | An email can appear to come an address of someone you know
RATs | “Remote access trojans” once inside your computer, allows the attacker access to sensitive data
Bacdoor.Breut | A trojan horse that opens a back door on the compromised computer. It then records keystrokes and may download more files on to the compromised computer.
Trojan.Nancrat | A trojan horse that opens a back door and steals information from the compromised computer.


Examples of subject lines of the email used by the attackers

  • Re:Invoice
  • PO
  • Remittance Advice
  • Payment Advise
  • Quotation Required
  • Transfer Copy
  • TT Payment
  • PAYMENT REMITTANCE
  • INQUIRY
  • Qoutation
  • QUOTATION
  • Request for Quotation

Huge impact with few resources

  • While advanced attack groups attract a lot of attention in the news, it’s important to remember that less skilled attackers can still cause major damages to a targeted company.
  • Even though the attackers in this case have limited resources, they can use Backdoor.Breut and Trojan.Nacrat to gain total access to a computer.
  • By focusing their RAT infections on specific employees, the attackers can potentially steal a substantial amount of money and sensitive information from affected businesses.

Take these measures to prevent the attack

  • If you do not have in-house tech support, retain the services of a tech support service
  • Keep security software up to date
  • Do not open attachments or click on links in suspicious email messages
  • Avoid providing any personal information when answering an email
  • Never enter personal information in a pop-up web page
  • If you’re uncertain about an email’s legitimacy, contact your computer consultant

Photo: Warner Bros (promotional)

Related Articles

19
Seven Resolutions for 2016 That Will Help Protect Your Small Business Computers

Simple steps you should take to help protect your computers and data in 2016.

20
Top Ten Free Antivirus Utilities For Your Small Business | 2016

PCMag.com has released its annual list of free antivirus utilities.

21
Most Small Businesses Have No Cyber Attack Response Plan

A survey reveals 80% of small business owners say their companies do not have a cyber attack response plan.

22
If Your Business Bank Account Gets Hacked, Your Bank May Blame You

For individual customers, banks must reimburse victims of cyber-fraud. For bank accounts of businesses, even one owned by one person, the same rule doesn’t apply.

23
Why You Should Still Use a Password Manager

A breach of a password management system provides another opportunity to explain how a password management service is better than other methods.

24
Advice From Google on Avoiding Scams Directed at Small Businesses

A wide range of warnings for avoiding scams from con-artists claiming to be from Google.

25
More Tips for Actively Managing Your Passwords

More helpful tips and ideas for managing your passwords.

26
What Small Business Customers Should Know and Do About the JPMorgan Chase Cyberattack

From the bank’s SEC filing and information provided on Chase.com, this is what is currently known about the cyberattack and what the bank is recommending to its customers.

27
How Hackers Use ‘Social Engineering’ and How to Prevent It

Following the recent wave of celebrities having online accounts hacked, here is an explanation of “social engineering,” part of the method the cyber criminals likely used.

28
Ten Tips From the FCC for Improving Your Small Business Cyber Security

Ways to improve your small business cyber security from the U.S. Federal Communications Commission.

29
Password Protection Advice from SmallBusiness.com

Username and password protection is an ongoing requirement for small businesses. Here is a roundup of helpful advice on internet security and password management that has appeared recently on SmallBusiness.com

30
Ebay Asks 145 Million Users to Change Passwords

Ebay is asking its 145 million users to change their passwords because of a cyberattack that compromised a database containing encrypted passwords “and other non-financial data.”

31
What is Two-Step Verification and Why You Should Start Using Them

It’s incredibly easy and fast to use a two-step verification method to protect your online accounts. Here’s how they work and why you should use them.

32
How (and Why) to Use a Password Management Application

A lock on your front door doesn’t do you any good if you keep the key under the mat, just like the best security on the web won’t protect you if you have the same bad password on every site you visit.

33
How to Reduce the Odds of Being Hacked While Using Public Wifi

Getting in a solid work session at the local coffee shop may be a tempting idea, but it has its risks. Like getting your personal information stolen because you were careless on a public network.