Ukrainian intelligence warned about prepared cyber-attack

22.08.2017 - 08:48 #Ukraine, #Cyber, #Attack
A new malware campaign targeting financial services firms across the country

Ukraine's central bank has warned state-owned and private banks across the country that a new malware campaign targeting financial services firms across the country may be a prelude to another assault of Not-Petya proportions, BankInfoSecurity reports.

"The nature of this malicious code, its mass distribution, and the fact that at the time of its distribution it was not detected by any anti-virus software, suggest that this attack is preparation for a mass cyber attack on the corporate networks of Ukrainian businesses," the central bank warned financial institutions earlier this month, in a letter seen by Reuters, according to BankInfoSecurity. It added that the attacks have been spreading via malicious Microsoft Word documents attached to emails. "In order to prevent cyber attacks, the National Bank of Ukraine consistently cooperates with banking sector participants, the State Service of Special Communication and Information Protection of Ukraine (SSCIPU), as well as relevant units of the Security Service of Ukraine and the National Police of Ukraine," a spokesman for the National Bank of Ukraine tells ISMG.

"On August 11, the NBU promptly informed banks about new malicious code, its characteristics, indicators of compromise and the need to take preventive measures to prevent the networks from being attacked by malicious codes." The bank is also spearheading the creation of a new group that would facilitate more real-time sharing of threat intelligence across the financial services sector.

"The NBU is involved in efforts to establish the NBU Computer Security Incident Response Team (CSIRT-NBU) to respond promptly to cyber incidents and share information in real time with all the banking sector participants and law enforcement agencies," the NBU spokesman says.

Malware and ransomware have long been distributed via malicious files attached to spam emails, designed to trick recipients into executing the attachment or otherwise aid the attack (see Hello! Can You Please Enable Macros?). If such attachments do get opened, they typically function as a "dropper," downloading additional malware from an attacker-controlled server onto the by now infected, or "zombie," endpoint. Earlier this month, Ukraine's national computer emergency response team, CERT-UA, warned that there is an elevated risk of attacks from August 20 to 25 as Ukraine celebrates its 1991 independence from the USSR.

Accordingly, CERT-UA advised organizations in Ukraine to take precautions to defend themselves against a potential reprise of the NotPetya - aka Petya-A, SortaPetya, Petna, ExPetr, GoldenEye, Nyetya, Diskcoder.C - campaign launched on June 26. Cyber police in Ukraine, as well as such security firms as Cisco Talos, ESET, Microsoft and Symantec, have said the attacks were facilitated by a "cunning backdoor" that attackers added to widely used accounting software called M.E. Doc.

Source: UNIAN

Поділитися публікацією:
Головні новини
Близький Схід
Число жертв геноциду Ізраїлю в секторі Газа досягло 44 056
Політика
МКС видав ордер на арешт Нетаньяху
Політика
Хезболла та Ліван схвалили проєкт угоди про припинення вогню з Ізраїлем
Шукайте нас на Twitter

© Ukraine in Arabic, 2018. All Rights Reserved.