• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover hacker group behind organized financial theft operation

Researchers Uncover Hacker Group Behind Organized Financial-Theft Operation

You are here: Home / General Cyber Security News / Researchers Uncover Hacker Group Behind Organized Financial-Theft Operation
January 5, 2022

Cybersecurity researchers have taken the wraps of an arranged financial-theft operation undertaken by a discreet actor to focus on transaction processing devices and siphon funds from entities mainly positioned in Latin The usa for at least 4 years.

The malicious hacking group has been codenamed Elephant Beetle by Israeli incident reaction company Sygnia, with the intrusions aimed at financial institutions and retail companies by injecting fraudulent transactions between benign action to slip beneath the radar soon after an intensive examine of the targets’ money constructions.

“The attack is relentless in its ingenious simplicity serving as an excellent tactic to cover in simple sight, without having any require to develop exploits,” the researchers stated in a report shared with The Hacker Information, calling out the group’s overlaps with a further tracked by Mandiant as FIN13, an “industrious” danger actor linked to info theft and ransomware attacks in Mexico stretching back again as early as 2016.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Automatic GitHub Backups

Elephant Beetle is reported to leverage an arsenal of no much less than 80 unique equipment and scripts to execute its attacks, even though at the same time using measures to mix in with the victim’s ecosystem around extended periods to reach its goals.

“The unique modus operandi associated with the Elephant Beetle is their deep investigation and knowledge of victim’s monetary units and operations and their persistent lookup for susceptible solutions to technically inject money transactions, finally primary to key fiscal theft,” Arie Zilberstein, vice president of incident response at Sygnia, told The Hacker News. “Specified the prolonged time period of persistence this team has in victim’s networks, they generally change and adapt their tactics and tooling to proceed to be suitable.”

Elephant Beetle

Zilberstein attributed the achievement of the marketing campaign to the vast attack surface area supplied by legacy methods that are existing in money institutions’ networks and can serve as entry factors, thereby enabling attackers to acquire a everlasting foothold into concentrate on networks.

The adversary’s modus operandi follows a small-profile sample that starts with planting backdoors to analyze the victim’s atmosphere, exclusively with an aim to comprehend the many procedures used to aid monetary transactions, adopted by inserting rogue transactions of its very own into the network that steal incremental quantities of dollars from the target to avoid location off alarm.

Prevent Data Breaches

But in the occasion the actor’s fraudulent steps appear to light-weight, they briefly cease their operations only to return a number of months later. The first entry is brokered by having benefit of unpatched flaws in exterior-experiencing Java-dependent web servers these as WebSphere and WebLogic, in the long run main to the deployment of web shells that permit distant code execution and lateral motion —

  • CVE-2017-1000486 (CVSS score: 9.8) – Primefaces Software Expression Language Injection
  • CVE-2015-7450 (CVSS rating: 9.8) – WebSphere Software Server Cleaning soap Deserialization Exploit
  • CVE-2010-5326 (CVSS score: 10.) – SAP NetWeaver Invoker Servlet Exploit
  • EDB-ID-24963 – SAP NetWeaver ConfigServlet Remote Code Execution

“This attack emphasizes after yet again that complex attackers are from time to time lurking in networks for [a] prolonged time,” Zilberstein reported. “While a ton of emphasis is supplied now to steering clear of and stopping the imminent risk of ransomware, some other threat actors are continue to operating to stealthily proliferate by themselves in networks to get a lengthy time period and continuous economical obtain.”

“Corporations have to have to fork out excess notice to these techniques, specifically all those which are externally experiencing, and accomplish patching and ongoing looking to reduce and detect attacks of very similar character,” Zilberstein added.

Observed this short article intriguing? Follow THN on Facebook, Twitter  and LinkedIn to read much more exceptional material we publish.


Some sections of this short article are sourced from:
thehackernews.com

Previous Post: «‘malsmoke’ exploits microsoft’s e signature verification ‘Malsmoke’ Exploits Microsoft’s E-Signature Verification
Next Post: Aqua Security Appoints Paul Calatayud as CISO Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.