AIRLINK 196.00 Increased By ▲ 2.44 (1.26%)
BOP 10.20 Increased By ▲ 0.25 (2.51%)
CNERGY 7.87 Decreased By ▼ -0.06 (-0.76%)
FCCL 39.85 Decreased By ▼ -0.80 (-1.97%)
FFL 17.09 Increased By ▲ 0.23 (1.36%)
FLYNG 27.16 Decreased By ▼ -0.59 (-2.13%)
HUBC 134.00 Increased By ▲ 1.42 (1.07%)
HUMNL 14.01 Increased By ▲ 0.12 (0.86%)
KEL 4.76 Increased By ▲ 0.16 (3.48%)
KOSM 6.65 Increased By ▲ 0.03 (0.45%)
MLCF 47.12 Decreased By ▼ -0.48 (-1.01%)
OGDC 214.45 Increased By ▲ 0.54 (0.25%)
PACE 6.81 Decreased By ▼ -0.12 (-1.73%)
PAEL 42.03 Increased By ▲ 0.79 (1.92%)
PIAHCLA 17.20 Increased By ▲ 0.05 (0.29%)
PIBTL 8.50 Increased By ▲ 0.09 (1.07%)
POWER 9.50 Decreased By ▼ -0.14 (-1.45%)
PPL 183.80 Increased By ▲ 1.45 (0.8%)
PRL 42.78 Increased By ▲ 0.82 (1.95%)
PTC 25.10 Increased By ▲ 0.20 (0.8%)
SEARL 110.47 Increased By ▲ 3.63 (3.4%)
SILK 1.00 Increased By ▲ 0.01 (1.01%)
SSGC 44.11 Increased By ▲ 4.01 (10%)
SYM 17.91 Increased By ▲ 0.44 (2.52%)
TELE 8.97 Increased By ▲ 0.13 (1.47%)
TPLP 13.09 Increased By ▲ 0.34 (2.67%)
TRG 67.30 Increased By ▲ 0.35 (0.52%)
WAVESAPP 11.67 Increased By ▲ 0.34 (3%)
WTL 1.84 Increased By ▲ 0.05 (2.79%)
YOUW 4.05 Decreased By ▼ -0.02 (-0.49%)
BR100 12,240 Increased By 195.6 (1.62%)
BR30 36,915 Increased By 335.1 (0.92%)
KSE100 115,562 Increased By 1524.2 (1.34%)
KSE30 36,295 Increased By 500.6 (1.4%)

IBM has uncovered a sophisticated fraud scheme run by a well- funded Eastern European gang of cyber criminals that uses a combination of phishing, malware and phone calls that the technology company says has netted more than $1 million from large and medium-sized US companies.
The scheme, which IBM security researchers have dubbed "The Dyre Wolf," is small in comparison with more recent widespread online fraud schemes but represents a new level of sophistication.
According to IBM, since last year the attackers have been targeting people working in companies by sending spam email with unsafe attachments to get a variant of the malware known as Dyre into as many computers as possible.
If installed, the malware waits until it recognises that the user is navigating to a bank website and instantly creates a
fake screen telling the user that the bank's site is having problems and to call a certain number.
If users call that number, they get through to an English-speaking operator who already knows what bank the users think they are contacting. The operator then elicits the users' banking details and immediately starts a large wire transfer to take money out of the relevant account.
The use of a live phone operator is what makes the scheme unique, said Caleb Barlow, vice president of IBM Security.
"What's very different in this case, is we saw a pivot of the attackers to use a set of social engineering techniques that I think are unprecedented," said Barlow. "The focus on wire transfers of large sums of money really got our attention."
IBM did not release any details on which companies fell prey to the scheme or the location of the perpetrators. Once the transfer is complete, the money is then quickly moved from bank to bank to evade detection. In one instance, IBM said, the gang hit the victim company with a denial of service attack - essentially bringing down their Web capabilities - so it would not discover the theft until much later.
International Business Machines Corp's security unit is recommending that companies make sure employees are trained in spotting phishing attacks - where emails or attachments can infect a computer - and to never provide banking credentials to anyone.

Copyright Reuters, 2015

Comments

Comments are closed.