Cyber crooks are using SWIFT to launch new sophisticated attacks, security researchers warn

Disguised malware is entering multiple enterprises’ networks via email phishing campaigns

Digital padlock hovering over a screen

Security researchers have claimed cyber criminals are using financial messaging service SWIFT in "special, devious ways" to launch new sophisticated attacks against users.

The SWIFT system is used by millions of people around the world and connects more than 11,000 banking and security organisations, market infrastructures and corporate customers in more than 200 countries and territories.

However, experts from Comodo Threat Research Lab have warned it's not as safe as some might believe. The firm claims have discovered a security threat where the perpetrators are using SWIFT to camouflage malware penetration into multiple enterprises' networks via an email phishing campaign.

"It informs the recipient about a SWIFT message' on a wire bank transfer to your designated bank account' and recommends getting the details from the attachment," the researchers said in a blog post.

"In reality, [the] swift message' is nothing but malware [known as] Trojan.JAVA.AdwindRAT."

The team of malware analysts said that once it has penetrated a user's system, it modifies the registry, spawns many processes, checks for an antivirus installation and tries to kill its process.

"Additionally, the malware checks for the presence of forensic, monitoring or anti-adware tools, then drops these malicious executable files and makes a connection with a domain in the hidden Tor network," the researchers explained. "The malware also tries to disable the Windows restore option and turns off the User Account Control feature, which prevents installing a program without the actual user being aware."

Comodo said the sole purpose of this malware attack is most likely an attempt at spying or a "reconnaissance" action, where the attackers send their "cyberspy" to collect information about the attacked enterprise network and endpoints, thus preparing for the second phase of the cyberattack with additional types of malware.

"Having the precise information about the enterprise, these cyber attackers can even create malware specifically adjusted to the target environment to bypass all defensive mechanisms of the enterprise and hit the heart of the target," the firm added.

Nevertheless, Comodo said the malware is only a threat if the company being targeted has been careless about the right defence and hasn't properly protected themselves with adequate malware protections and spam filters.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021
What is cyber warfare?
Security

What is cyber warfare?

15 Oct 2021