Download presentation
Presentation is loading. Please wait.
Published byJean Booker Modified over 7 years ago
1
Business Process Compromise in Financial Institutes Kavya Kushnoor
2
Objectives: Business Process Business Process Compromise
Features of BCP Some detected malware names Examples of Infamous Attacks Precautionary Measures
3
What is a Business Process?
It is a structural representation of the flow of activities in an organization and consists of stages and steps of a business process. These are unique for each industry and company. Example: Loan eligibility determination (in picture)
4
What is a Business Process Compromise?
It is a type of cyber attack where an attacker looks for loop-holes in business processes, vulnerable systems and susceptible practices which are handled by machines
5
Features of BCP A susceptible business process which is completely automated and machine run Once a vulnerability is identified, the hacker manipulates the machine without the employee’s knowledge The employee trusts the policies to work as usual while the attackers have access to funds and valuable data The attacker is motivated by fraudulent financial gains Time taken to identify it is generally 5 months on average
6
Variants of detected malware:
TROJ_RATANKBA.A. BKDR_DESTOVER.ADU BKDR_DESTOVER.A TROJ_CVE B SWF_EXPLOYT.YYRQ TSPY64_BANKER.YWNQD BKDR64_KLIPODENC.ZHEB-A TROJ64_KLIPODLDR.ZHEB-A
7
Some Infamous Attacks:
Bank SWIFT Communication Lines Fed Reserve Bank of NY Install malware to manipulate communication 2016 Bangladesh bank incident ($81 million) Tien Phong Bank (Vietnam) ($1.3 million) Banco del Austro (Ecuador) ($12 million) Link Requests fraudulent transfer of $$ Tamper with Printing system to avoid discovery of fund transfer
8
Precautionary Measures
Secure network against malware using technologies like endpoint protection and security solutions System lockdown for critical applications Regular audit and analysis of policies Vendor evaluation and risk assessments Educate and train employees to detect abnormal behavior and social engineering attacks Features Link
9
Links analysis/predictions/2017 threats/security-101-business-process-compromise protection/sps.html?cm_mmc=VURL: /us/enterprise/network-security/interscan-web-security/index.html-_-1:1 and-other-financial-organizations-hit-by-new-malware-attacks
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.