Business Process Compromise in Financial Institutes Kavya Kushnoor
Objectives: Business Process Business Process Compromise Features of BCP Some detected malware names Examples of Infamous Attacks Precautionary Measures
What is a Business Process? It is a structural representation of the flow of activities in an organization and consists of stages and steps of a business process. These are unique for each industry and company. Example: Loan eligibility determination (in picture)
What is a Business Process Compromise? It is a type of cyber attack where an attacker looks for loop-holes in business processes, vulnerable systems and susceptible practices which are handled by machines
Features of BCP A susceptible business process which is completely automated and machine run Once a vulnerability is identified, the hacker manipulates the machine without the employee’s knowledge The employee trusts the policies to work as usual while the attackers have access to funds and valuable data The attacker is motivated by fraudulent financial gains Time taken to identify it is generally 5 months on average
Variants of detected malware: TROJ_RATANKBA.A. BKDR_DESTOVER.ADU BKDR_DESTOVER.A TROJ_CVE20130074.B SWF_EXPLOYT.YYRQ TSPY64_BANKER.YWNQD BKDR64_KLIPODENC.ZHEB-A TROJ64_KLIPODLDR.ZHEB-A
Some Infamous Attacks: Bank SWIFT Communication Lines Fed Reserve Bank of NY Install malware to manipulate communication 2016 Bangladesh bank incident ($81 million) Tien Phong Bank (Vietnam) ($1.3 million) Banco del Austro (Ecuador) ($12 million) Link Requests fraudulent transfer of $$ Tamper with Printing system to avoid discovery of fund transfer
Precautionary Measures Secure network against malware using technologies like endpoint protection and security solutions System lockdown for critical applications Regular audit and analysis of policies Vendor evaluation and risk assessments Educate and train employees to detect abnormal behavior and social engineering attacks Features Link
Links https://www.trendmicro.com/vinfo/us/security/research-and- analysis/predictions/2017 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital- threats/security-101-business-process-compromise https://www.trendmicro.com/en_us/business/products/user- protection/sps.html?cm_mmc=VURL:www.trendmicro.com-_-VURL-_- /us/enterprise/network-security/interscan-web-security/index.html-_-1:1 https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/polish-banks- and-other-financial-organizations-hit-by-new-malware-attacks