Cyber crooks are using SWIFT to launch new sophisticated attacks, security researchers warn
Disguised malware is entering multiple enterprises’ networks via email phishing campaigns
Security researchers have claimed cyber criminals are using financial messaging service SWIFT in "special, devious ways" to launch new sophisticated attacks against users.
The SWIFT system is used by millions of people around the world and connects more than 11,000 banking and security organisations, market infrastructures and corporate customers in more than 200 countries and territories.
However, experts from Comodo Threat Research Lab have warned it's not as safe as some might believe. The firm claims have discovered a security threat where the perpetrators are using SWIFT to camouflage malware penetration into multiple enterprises' networks via an email phishing campaign.
"It informs the recipient about a SWIFT message' on a wire bank transfer to your designated bank account' and recommends getting the details from the attachment," the researchers said in a blog post.
"In reality, [the] swift message' is nothing but malware [known as] Trojan.JAVA.AdwindRAT."
The team of malware analysts said that once it has penetrated a user's system, it modifies the registry, spawns many processes, checks for an antivirus installation and tries to kill its process.
"Additionally, the malware checks for the presence of forensic, monitoring or anti-adware tools, then drops these malicious executable files and makes a connection with a domain in the hidden Tor network," the researchers explained. "The malware also tries to disable the Windows restore option and turns off the User Account Control feature, which prevents installing a program without the actual user being aware."
Comodo said the sole purpose of this malware attack is most likely an attempt at spying or a "reconnaissance" action, where the attackers send their "cyberspy" to collect information about the attacked enterprise network and endpoints, thus preparing for the second phase of the cyberattack with additional types of malware.
"Having the precise information about the enterprise, these cyber attackers can even create malware specifically adjusted to the target environment to bypass all defensive mechanisms of the enterprise and hit the heart of the target," the firm added.
Nevertheless, Comodo said the malware is only a threat if the company being targeted has been careless about the right defence and hasn't properly protected themselves with adequate malware protections and spam filters.
Digital document processes in 2020: A spotlight on Western Europe
The shift from best practice to business necessityDownload now
Four security considerations for cloud migration
The good, the bad, and the ugly of cloud computingDownload now
VR leads the way in manufacturing
How VR is digitally transforming our worldDownload now
Deeper than digital
Top-performing modern enterprises show why more perfect software is fundamental to successDownload now