Hackers Prove Patient But Swift
May 14, 2016
Breaching a global bank network is no smash and grab operation. As organizations focus and fund their cybersecurity resources with even greater alacrity, the bad guys have to continue to polish the edge of their sword, patiently waiting for the right opportunities to score bigger and bigger hits. Such is the case with the recent — and second — attack on Swift, the global messaging network banks use to move money around. If you think you’re covering all your bases and keeping your data out of harm’s way, you may be giving yesterday’s news and last week’s security protocols too much play. Hackers, in one small way, are like PGA Tour Pros: These Guys Are Good.
Old Dogs, New Tricks
As reported in a recent NY Times article and elsewhere, hackers used malware to manipulate a PDF reader used by an unnamed Swift member bank to confirm payments. They repackaged the PDFs, redirected funds, and then swept the PDF to remove all evidence of manipulation. In other words, they didn’t need access to a broad brush of account information. They needed legitimate network credentials and patience, and the flow of PDFs. So ask yourself, how many times do you send sensitive information through a PDF?
Swift and Decisive Preparedness
ICS eats malware for breakfast. Not really. In a world of metadata, that would be a metaphor. But you get the point. We use tomorrow’s technology to secure your network from today’s threats. And then we use ethical hackers to test our work and identify points of vulnerability based on current and future threats.
The process takes time, but the call is fast. Or swift.