Cyber crooks are using SWIFT to launch new sophisticated attacks, security researchers warn
Disguised malware is entering multiple enterprises’ networks via email phishing campaigns
Security researchers have claimed cyber criminals are using financial messaging service SWIFT in "special, devious ways" to launch new sophisticated attacks against users.
The SWIFT system is used by millions of people around the world and connects more than 11,000 banking and security organisations, market infrastructures and corporate customers in more than 200 countries and territories.
However, experts from Comodo Threat Research Lab have warned it's not as safe as some might believe. The firm claims have discovered a security threat where the perpetrators are using SWIFT to camouflage malware penetration into multiple enterprises' networks via an email phishing campaign.
"It informs the recipient about a SWIFT message' on a wire bank transfer to your designated bank account' and recommends getting the details from the attachment," the researchers said in a blog post.
"In reality, [the] swift message' is nothing but malware [known as] Trojan.JAVA.AdwindRAT."
The team of malware analysts said that once it has penetrated a user's system, it modifies the registry, spawns many processes, checks for an antivirus installation and tries to kill its process.
"Additionally, the malware checks for the presence of forensic, monitoring or anti-adware tools, then drops these malicious executable files and makes a connection with a domain in the hidden Tor network," the researchers explained. "The malware also tries to disable the Windows restore option and turns off the User Account Control feature, which prevents installing a program without the actual user being aware."
Comodo said the sole purpose of this malware attack is most likely an attempt at spying or a "reconnaissance" action, where the attackers send their "cyberspy" to collect information about the attacked enterprise network and endpoints, thus preparing for the second phase of the cyberattack with additional types of malware.
"Having the precise information about the enterprise, these cyber attackers can even create malware specifically adjusted to the target environment to bypass all defensive mechanisms of the enterprise and hit the heart of the target," the firm added.
Nevertheless, Comodo said the malware is only a threat if the company being targeted has been careless about the right defence and hasn't properly protected themselves with adequate malware protections and spam filters.
Unlocking collaboration: Making software work better together
How to improve collaboration and agility with the right techDownload now
Four steps to field service excellence
How to thrive in the experience economyDownload now
Six things a developer should know about Postgres
Why enterprises are choosing PostgreSQLDownload now
The path to CX excellence for B2B services
The four stages to thrive in the experience economyDownload now