article thumbnail

Shared malware code links SWIFT-related breaches at banks and North Korean hackers

Network World

Malware links suggest that North Korean hackers might be behind recent attacks against several Asian banks, including the theft of US$81 million from the Bangladesh central bank earlier this year. The same malware was also previously linked to an attempted theft of $1 million from Tien Phong Bank in Vietnam.

Malware 63
article thumbnail

This Android Trojan blocks the victim from alerting banks

Network World

A new Trojan that can steal your payment data will also try to stymie you from alerting your bank. Security vendor Symantec has noticed a “call-barring” function within newer versions of the Android.Fakebank.B The malware works by first scanning the phone for specific banking apps. malware family.

Banking 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Recent malware attacks on Polish banks tied to wider hacking campaign

Network World

Malware attacks that recently put the Polish banking sector on alert were part of a larger campaign that targeted financial organizations from more than 30 countries. There are also similarities to tools previously used by a group of attackers known in the security industry as Lazarus.

Malware 66
article thumbnail

Second group of hackers found also targeting SWIFT users

Network World

A second hacking group is also trying to rob banks by exploiting the SWIFT money transfer system, following a US$81 million heist in February that used a similar approach. Hong Kong, Australia, and other countries, according to a Tuesday report from security firm Symantec.

Groups 60
article thumbnail

Top 10 Most-Destructive Computer Viruses

Galido

In the age of Internet banking and online shopping, a compromised identity is much more than just a name and social security number: it’s your address, date of birth, mother’s maiden name, and even your secret security questions (your first pet, your favorite teacher, or your best friend from grade school).

Malware 60
article thumbnail

The Hacker Mind: Follow The Rabbit

ForAllSecure

So I started intercepting all the traffic on your network. Elliot Alderson: You are using Tor networking to keep the server's anonymous. Fast, GB wifi leads Elliot to discover a TOR network which leads him to the onion routing protocol. Part that doesn't allow good to exist without condition. Then I decided to hack you.

article thumbnail

The Hacker Mind Podcast: The Fog of Cyber War

ForAllSecure

He suggested I back off and leave the speculation about the Russian Business Network, a group at the time responsible for many online attacks, to Europol. Although the old Russian Business Network probably is long gone and replaced with much bigger players. But something didn’t feel right about that either. No one's good enough.