AIRLINK 200.02 Increased By ▲ 6.46 (3.34%)
BOP 10.23 Increased By ▲ 0.28 (2.81%)
CNERGY 7.83 Decreased By ▼ -0.10 (-1.26%)
FCCL 40.00 Decreased By ▼ -0.65 (-1.6%)
FFL 16.80 Decreased By ▼ -0.06 (-0.36%)
FLYNG 26.50 Decreased By ▼ -1.25 (-4.5%)
HUBC 132.79 Increased By ▲ 0.21 (0.16%)
HUMNL 13.99 Increased By ▲ 0.10 (0.72%)
KEL 4.67 Increased By ▲ 0.07 (1.52%)
KOSM 6.57 Decreased By ▼ -0.05 (-0.76%)
MLCF 46.66 Decreased By ▼ -0.94 (-1.97%)
OGDC 211.89 Decreased By ▼ -2.02 (-0.94%)
PACE 6.89 Decreased By ▼ -0.04 (-0.58%)
PAEL 41.34 Increased By ▲ 0.10 (0.24%)
PIAHCLA 17.02 Decreased By ▼ -0.13 (-0.76%)
PIBTL 8.13 Decreased By ▼ -0.28 (-3.33%)
POWER 9.37 Decreased By ▼ -0.27 (-2.8%)
PPL 181.45 Decreased By ▼ -0.90 (-0.49%)
PRL 41.60 Decreased By ▼ -0.36 (-0.86%)
PTC 24.69 Decreased By ▼ -0.21 (-0.84%)
SEARL 112.25 Increased By ▲ 5.41 (5.06%)
SILK 1.00 Increased By ▲ 0.01 (1.01%)
SSGC 44.00 Increased By ▲ 3.90 (9.73%)
SYM 19.18 Increased By ▲ 1.71 (9.79%)
TELE 8.91 Increased By ▲ 0.07 (0.79%)
TPLP 12.90 Increased By ▲ 0.15 (1.18%)
TRG 67.40 Increased By ▲ 0.45 (0.67%)
WAVESAPP 11.45 Increased By ▲ 0.12 (1.06%)
WTL 1.78 Decreased By ▼ -0.01 (-0.56%)
YOUW 4.00 Decreased By ▼ -0.07 (-1.72%)
BR100 12,170 Increased By 125.6 (1.04%)
BR30 36,589 Increased By 8.6 (0.02%)
KSE100 114,880 Increased By 842.7 (0.74%)
KSE30 36,125 Increased By 330.6 (0.92%)

IBM has uncovered a sophisticated fraud scheme run by a well- funded Eastern European gang of cyber criminals that uses a combination of phishing, malware and phone calls that the technology company says has netted more than $1 million from large and medium-sized US companies.
The scheme, which IBM security researchers have dubbed "The Dyre Wolf," is small in comparison with more recent widespread online fraud schemes but represents a new level of sophistication.
According to IBM, since last year the attackers have been targeting people working in companies by sending spam email with unsafe attachments to get a variant of the malware known as Dyre into as many computers as possible.
If installed, the malware waits until it recognises that the user is navigating to a bank website and instantly creates a
fake screen telling the user that the bank's site is having problems and to call a certain number.
If users call that number, they get through to an English-speaking operator who already knows what bank the users think they are contacting. The operator then elicits the users' banking details and immediately starts a large wire transfer to take money out of the relevant account.
The use of a live phone operator is what makes the scheme unique, said Caleb Barlow, vice president of IBM Security.
"What's very different in this case, is we saw a pivot of the attackers to use a set of social engineering techniques that I think are unprecedented," said Barlow. "The focus on wire transfers of large sums of money really got our attention."
IBM did not release any details on which companies fell prey to the scheme or the location of the perpetrators. Once the transfer is complete, the money is then quickly moved from bank to bank to evade detection. In one instance, IBM said, the gang hit the victim company with a denial of service attack - essentially bringing down their Web capabilities - so it would not discover the theft until much later.
International Business Machines Corp's security unit is recommending that companies make sure employees are trained in spotting phishing attacks - where emails or attachments can infect a computer - and to never provide banking credentials to anyone.

Copyright Reuters, 2015

Comments

Comments are closed.