Cloud-based payroll providers warned of new malware risk

Trusteer tells online payroll providers to step up security in wake of emerging malware threat.

Payroll

Online payroll providers are being told to tighten up their login procedures, following the discovery of a new malware threat by Trusteer.

The security vendor has uncovered a Zeus that targets cloud-based payroll providers, and fears it could be used by cybercriminals to steal large sums of money from companies that use online services.

Trusteer researchers have pinpointed a version of this malware that targets users of Canada-based payroll provider Ceridian, allowing hackers to infiltrate the service.

Targeting payroll systems enables attackers to siphon much larger amounts of money than by targeting individual consumers

The Zeus captures a screenshot of the Ceridian login page when a user infected with the Trojan visits the site. This image records the employee's username, password, company number and the icon needed to bypass the firm's image-based authentication system.

In a blog post, highlighting users to the scam, Trusteer said the financial losses associated with this type of attack are significant, as cybercriminals could use it to add fictitious employees to payroll systems and siphon off funds.

"Targeting enterprise payroll systems enables attackers to siphon much larger amounts of money than by targeting individual consumers," stated the blog.

"[Also] using these valid credentials, fraudsters can also access personal, corporate and financial data without the need to hack into systems, while leaving very little evidence that malicious access is occurring."

Speaking to IT Pro, Oren Kedem, director of product marketing at Trusteer, said the vendor's findings should prompt payroll providers to review how they protect customer data.

"They should look at following the example of online banks and the login procedures they have in place. Payroll providers need a similar class of protection," said Kadem.

"They require many layers of protection that covers them on the client and server side, as well as an additional form of authentication to reduce the risk of attack."

Steven Malone, chief technology officer at IT security firm Metadigm, said, as cloud adoption grows, service providers will find themselves at greater risk from cybercriminals.

"As organisations and consumers continue to move to the cloud, the attention of malware authors will be firmly focused on the growing number of cloud providers," Malone told IT Pro.

"Security holes of this kind can affect multiple customers in one attack, which is why it is vital that businesses choose a technology partner who can provide expertise and guidance to protect [customer] goodwill and reputations," he added.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021