Stealing is not always the end goal
Posted: Sun Jan 19, 2025 5:29 am
image
On this site, the client is asked to enter the login of the personal account under the pretext of researching the convenience of Sberbank services. Subsequently, the virus independently, on behalf of the client, receives and sends SMS passwords to the attackers to log in and confirm fraudulent transactions in Sberbank Online.
In fact, stealing money is not always the main goal. For example, kuwait whatsapp number list
hackers very often carry out denial of service attacks on remote banking systems (RBS) in order to conceal fraudulent transactions.
There is a bank and it has a number of resources accessible from the network. Usually this is, at a minimum, a corporate website, a DBO system and some additional network services (VPN, for example).
If an attacker can gain access to the internal network, the range of his capabilities and targets will expand significantly. By seizing remote control of even one computer in the bank's network, an attacker can carry out attacks on internal systems.
Given the development of hacker tools, there are currently no particular difficulties in carrying out attacks through controlled intermediate hosting on other systems. That is, a captured computer in the bank's network will transmit to the bank's systems those requests that the attacker needs, and send the responses to them via the Internet back to the attacker.
Vladimir Fomenko, CEO of the hosting company King Servers, believes that in order to avoid or minimize the risks of hacking, it is worth paying attention to the data centers (DC) where the servers are located.
"Not everyone is suitable for a bank. The DC must be certified and meet the reliability standard of at least Tier 3. The hosting provider providing infrastructure rental services based on the DC must be certified to the PCI DSS standard," Fomenko
Attacks from different directions
It is important to understand that it is technically very easy to carry out attacks through one intermediate hosting. Thus, the attacker needs to seize control over at least one host. In reality, everything depends on the specific situation, but there are a number of typical scenarios.
On this site, the client is asked to enter the login of the personal account under the pretext of researching the convenience of Sberbank services. Subsequently, the virus independently, on behalf of the client, receives and sends SMS passwords to the attackers to log in and confirm fraudulent transactions in Sberbank Online.
In fact, stealing money is not always the main goal. For example, kuwait whatsapp number list
hackers very often carry out denial of service attacks on remote banking systems (RBS) in order to conceal fraudulent transactions.
There is a bank and it has a number of resources accessible from the network. Usually this is, at a minimum, a corporate website, a DBO system and some additional network services (VPN, for example).
If an attacker can gain access to the internal network, the range of his capabilities and targets will expand significantly. By seizing remote control of even one computer in the bank's network, an attacker can carry out attacks on internal systems.
Given the development of hacker tools, there are currently no particular difficulties in carrying out attacks through controlled intermediate hosting on other systems. That is, a captured computer in the bank's network will transmit to the bank's systems those requests that the attacker needs, and send the responses to them via the Internet back to the attacker.
Vladimir Fomenko, CEO of the hosting company King Servers, believes that in order to avoid or minimize the risks of hacking, it is worth paying attention to the data centers (DC) where the servers are located.
"Not everyone is suitable for a bank. The DC must be certified and meet the reliability standard of at least Tier 3. The hosting provider providing infrastructure rental services based on the DC must be certified to the PCI DSS standard," Fomenko
Attacks from different directions
It is important to understand that it is technically very easy to carry out attacks through one intermediate hosting. Thus, the attacker needs to seize control over at least one host. In reality, everything depends on the specific situation, but there are a number of typical scenarios.