Feelings can be misleading

Online banking and security still seem to have only the most tenuous relation to each other. Even though more and more German banks are moving towards implementing HBCI, an independent protocol for online banking, (entering a PIN number via an external card-reader, which may have its own display) the investment needed (between 70 and 170 euros) is frightening a lot of customers off.

It seems that some of the British banks have been thinking about this, and drawing their own conclusions. A recently published article covers a major British bank’s refusal to implement two factor authentication: apparently the increased popularity of online banking shows that ‘customers already feel safe on the Internet’, without the need for extra hardware. But if the bank has the feeling that customers are blissfully happy, perhaps they should dig a little deeper.

Banks which don’t implement appropriate security may find themselves dealing with satisifed customers like the German woman who recently came to us for help. Her antivirus solution (not ours, I should hasten to add!) malfunctioned. The consequence – a Trojan got away with a smooth 5000 euros from her account. The local prosecution service suspended the investigation, because the attack could only be traced back to a computer located at a university. The bank, meanwhile, has spent more than a month trying to push the blame back onto the customer. The happy customer, who thought that the combination of antivirus software and PIN/ TAN would keep her assets safe…

Feelings can be misleading

Your email address will not be published. Required fields are marked *



Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Andariel evolves to target South Korea with ransomware

In April 2021, we observed a suspicious Word document with a Korean file name and decoy. It revealed a novel infection scheme and an unfamiliar payload. After a deep analysis, we came to a conclusion: the Andariel group was behind these attacks.

Operation TunnelSnake

A newly discovered rootkit that we dub ‘Moriya’ is used by an unknown actor to deploy passive backdoors on public facing servers, facilitating the creation of a covert C&C communication channel through which they can be silently controlled. The victims are located in Africa, South and South-East Asia.

Subscribe to our weekly e-mails

The hottest research right in your inbox