fbpx
Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Penetration Testing

          Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

FBI Spots Spear-phishing Posing As Truist Bank To Deliver Malware

FBI Spots Spear-phishing Posing As Truist Bank To Deliver Malware

Threat actors impersonated Truist, the sixth-largest US bank holding company, in a spear-phishing campaign attempting to infect recipients with what looks like remote access trojan (RAT) malware.

They also tailored the phishing campaign “to spoof the financial institution through registered domains, email subjects, and an application, all appearing to be related to the institution,” the FBI said in a TLP:WHITE private industry notification.

The PIN was released in coordination with DHS-CISA and is designed to provide security professionals and network admins with the indicators of compromise needed to detect and block such attacks.

Multiple impersonated financial institutions

In one of the attacks targeting a renewable energy company in February 2021, the phishing emails instructed the target to download a malicious Windows app mimicking the legitimate Truist Financial SecureBank App and supposedly needed to complete the process behind a $62 million loan.

“The fraudulent loan amount was in line with the victim’s business model,” the FBI added. “The phishing e-mail also contained a link to download the application and a username and password for access.”

“The phishing e-mail appeared to originate from a United Kingdom-based financial institution, stating the US financial institution’s loan to the victim was confirmed and could be accessed through an application which appeared to represent the US financial institution.”

Also Read: 4 Best Practices On How To Use SkillsFuture Credit

The threat actors hosted the fake Windows application on a fraudulent domain registered by the threat actors before the attack and impersonating Truist.

Other US and UK financial institutions (e.g., MayBank, FNB America, and Cumberland Private) seem to have also been impersonated in this spear-phishing campaign.

Impersonated financial institutions
Impersonated financial institutions

Malware with information-stealing capabilities

To increase their attacks’ success rate, the attackers used malware currently undetected by anti-malware engines on VirusTotal.

The malware deployed after recipients download and install the malicious executable in the spear-phishing emails connects to the secureportal(.)online domain.

As further detailed on the VirusTotal page for the malware sample shared by the FBI, the attackers can use the malware to log keystrokes and take screenshots of the victims’ screens.

Financial SecureBank App
Fake Truist Financial SecureBank App loading (BleepingComputer)

According to VirusTotal, the malware’s list of capabilities includes:

  • Privilege escalation
  • Communications over UDP network
  • System registry manipulation
  • Screenshot grabbing
  • Listening for incoming communication
  • Running a keylogger
  • Communicating using DNS
  • File downloader/dropper
  • Communications over HTTP
  • Code injection with CreateRemoteThread in a remote process

Last month, world-leading employment agency Michael Page was impersonated in a similar phishing campaign attempting to infect recipients with Ursnif data-stealing malware capable of harvesting credentials and sensitive data from infected computers.

Also Read: 3 Reasons Why You Must Take A PDPA Singapore Course

Using info harvested from infected systems, the attackers can then steal their victims’ login credentials and various other sensitive data to further compromise their accounts or networks.

Fake applications used as decoys while performing malicious activity in the background is a known tactic employed in the past by cybercriminals and state-backed threat actors such as the Lazarus Group [12].

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us