IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Cyber crooks are using SWIFT to launch new sophisticated attacks, security researchers warn

Disguised malware is entering multiple enterprises’ networks via email phishing campaigns

Security researchers have claimed cyber criminals are using financial messaging service SWIFT in "special, devious ways" to launch new sophisticated attacks against users.

The SWIFT system is used by millions of people around the world and connects more than 11,000 banking and security organisations, market infrastructures and corporate customers in more than 200 countries and territories.

However, experts from Comodo Threat Research Lab have warned it's not as safe as some might believe. The firm claims have discovered a security threat where the perpetrators are using SWIFT to camouflage malware penetration into multiple enterprises' networks via an email phishing campaign.

"It informs the recipient about a SWIFT message' on a wire bank transfer to your designated bank account' and recommends getting the details from the attachment," the researchers said in a blog post.

"In reality, [the] swift message' is nothing but malware [known as] Trojan.JAVA.AdwindRAT."

The team of malware analysts said that once it has penetrated a user's system, it modifies the registry, spawns many processes, checks for an antivirus installation and tries to kill its process.

"Additionally, the malware checks for the presence of forensic, monitoring or anti-adware tools, then drops these malicious executable files and makes a connection with a domain in the hidden Tor network," the researchers explained. "The malware also tries to disable the Windows restore option and turns off the User Account Control feature, which prevents installing a program without the actual user being aware."

Comodo said the sole purpose of this malware attack is most likely an attempt at spying or a "reconnaissance" action, where the attackers send their "cyberspy" to collect information about the attacked enterprise network and endpoints, thus preparing for the second phase of the cyberattack with additional types of malware.

"Having the precise information about the enterprise, these cyber attackers can even create malware specifically adjusted to the target environment to bypass all defensive mechanisms of the enterprise and hit the heart of the target," the firm added.

Nevertheless, Comodo said the malware is only a threat if the company being targeted has been careless about the right defence and hasn't properly protected themselves with adequate malware protections and spam filters.

Featured Resources

Four strategies for building a hybrid workplace that works

All indications are that the future of work is hybrid, if it's not here already

Free webinar

The digital marketer’s guide to contextual insights and trends

How to use contextual intelligence to uncover new insights and inform strategies

Free Download

Ransomware and Microsoft 365 for business

What you need to know about reducing ransomware risk

Free Download

Building a modern strategy for analytics and machine learning success

Turning into business value

Free Download

Most Popular

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack
hacking

Russian hackers declare war on 10 countries after failed Eurovision DDoS attack

16 May 2022
Windows Server admins say latest Patch Tuesday broke authentication policies
Server & storage

Windows Server admins say latest Patch Tuesday broke authentication policies

12 May 2022
IT admin deletes company’s databases and is jailed for seven years
Policy & legislation

IT admin deletes company’s databases and is jailed for seven years

16 May 2022