Know the Types of Cyber Threats.

Know the Types of Cyber Threats.

Learn about the most common cybersecurity threats and tips to prevent them at your financial institution.

?

Cyber threats change at a rapid pace. Tactics and attack methods are changing and improving daily.

Cybercriminals access a computer or network server to cause harm using several paths, which are also called attack vectors.

Common ways to gain access to a computer or network include:

  • Removable?media such as flash drives
  • Brute force attack using trial and error to decode encrypted data
  • Web or email attacks
  • Unauthorized use of your organization's system privileges
  • Loss or theft of devices containing confidential information

The Division of Banks (DOB) encourages all financial institutions and non-depository financial institutions to develop detailed cybersecurity policies to deter attacks.

Types of cyber threats your institution should be aware of include:

  • Malware
  • Ransomware
  • Distributed denial of service (DDoS) attacks
  • Spam and Phishing
  • Corporate Account Takeover (CATO)
  • Automated Teller Machine (ATM) Cash Out

Malware

Malware is also known as malicious code or malicious software. Malware is a program inserted into a system to compromise the confidentiality, integrity, or availability of data. It is done secretly and can affect your data, applications, or operating system. Malware has become one of the most significant external threat to systems. Malware can cause?widespread damage and disruption, and requires huge efforts within most organizations.

Spyware, a malware intended to violate privacy, has also become a major concern to organizations. Although privacy-violating malware has been in use for many years, it has become much more common recently. Spyware invades many systems to track personal activities and conduct financial fraud.

Organizations also face similar threats from several forms of non-malware threats. These forms of cyber threats are often associated with malware. A more common form is phishing. Phishing involves tricking individuals into revealing sensitive or personal information.

Tips for preventing Malware from the?National Institute of Standards and Technology (NIST) Guide to Malware Incident Prevention and Handling:

  • Require e-mail file attachments to be scanned and saved to local drives or removable media.
  • Don’t allow certain types of files (e.g., .exe files) to be sent or received by e-mail.
  • Restrict removable media, such as CDs or flash drives, on systems that are high risk.
  • Limit the number of users with administrator-level access or privileges.?
  • Ensure systems are updated regularly with operating system and application upgrades and patches.

Ransomware

Ransomware prevents or limits users from accessing their system via malware. Ransomware asks you to pay a ransom using online payment methods to regain access to your system or data. Online payment methods usually include virtual currencies such as bitcoins.?Ransomware is one of the most widely used methods of attacks.

Ransomware enters computer networks and encrypts files using public-key encryption. Unlike other malware, this encryption key stays on the cyber criminal’s server. Cyber criminals will request ransom for this private key.?Cyber criminals are using encryption as a weapon to hold the data hostage.

Ransomware is hard to detect before it’s too late, and ransomware techniques continue to evolve. Because of this, your institution should focus on prevention efforts. Prevention efforts include training for employees and strong information security controls.

The DOB recommends developing strong business continuity plans and incident response plans. Plan development may?help in the event of a ransomware attack.

Distributed Denial of Service (DDoS) Attacks

DDoS attacks make an online service unavailable by overwhelming it with excessive traffic from many locations and sources. Website response time slows down, preventing access during a DDoS?attack. Cybercriminals develop large networks of infected computers called Botnets by planting malware. A DDoS attack may not be the primary cybercrime. The attacks often create a distraction while other types of fraud and cyber intrusion are attempted.

The?Federal Financial Institutions Examination Council (FFIEC) issued a?joint statement on?DDoS attacks, risk mitigation, and additional resources.

Spam & Phishing

Spam includes unwanted, unsolicited, or undesirable messages and emails. Phishing is a form of social engineering, including attempts to get sensitive information. Phishing attempts will appear to be from a trustworthy person or business.

Cybercriminals pretend to be official representatives, sending you an email or message with a warning about your account information. The message will often ask for a response by following a link to a fake website or email address where you will provide confidential information. The format of the message will typically appear legitimate using proper logos and names. Any information entered into the fake link goes to the cyber-criminal.

The FBI developed?tips for preventing phishing attacks.

Corporate Account Takeover (CATO)

CATO is a business entity theft where cyber thieves impersonate the business and send unauthorized wire and ACH transactions.? The unauthorized funds are sent to accounts controlled by the cyber-criminal.

Many businesses are vulnerable to a CATO attack. Institutions with weak computer safeguards and minimal controls over online banking systems are easy targets. This form of cybercrime can result in large?losses. Cybercriminals use malware to infect a computer through e-mail, websites, or malware disguised as software.

The Conference of State Bank Supervisors (CSBS) developed a?CATO best practices document.?

Automated Teller Machine (ATM) Cash Out

ATM Cash Out is a type of large dollar-value ATM fraud. Cash-outs involve simultaneous large cash withdrawals from several ATMs in many regions. It may also include large withdrawals at one ATM.

The Cash Out attack usually affects small- to medium-sized financial institutions. It involves changing the settings on ATM web-based control panels. Cybercriminals change the ATM's dispense function control to "Unlimited Operations."?The “Unlimited Operations" setting allows withdrawal of funds over the customer's account balance or beyond the ATM’s cash limit. Stolen ATM or debit card information is often used to withdraw funds. As a result, your financial institution can suffer large dollar losses.

The DOB recommends reviewing your control over information technology networks, card issuer authorization systems, ATM parameters management systems, and fraud detection and response processes to prevent ATM Cash Out attacks.

要查看或添加评论,请登录

Dr. Atif Ali的更多文章

  • Deep Research in the Age of AI: Avoiding the Speed Trap

    Deep Research in the Age of AI: Avoiding the Speed Trap

    Understanding the True Potential of AI: It’s Not About Speed Praising AI for being fast is like admiring a microscope…

  • 20 New Technology Trends for 2025

    20 New Technology Trends for 2025

    Technology is evolving faster than ever, driving rapid changes and reshaping the world. It's not just about new trends;…

  • MALWARE DETECTION AND ANALYSIS

    MALWARE DETECTION AND ANALYSIS

    Although the malware was first annoying, it has now spread in one way or another to practically every country in the…

    1 条评论
  • AI tools for researchers in 2024

    AI tools for researchers in 2024

    AI tools researchers are using in the early stages Assistant by scite – An AI-powered for literature retrieval…

    1 条评论
  • AI Research Scientist Career Guide

    AI Research Scientist Career Guide

    The artificial intelligence (AI) sector is expanding rapidly, and with it comes an ever-growing demand for AI research…

  • Most Important AI Researcher Skills in 2024

    Most Important AI Researcher Skills in 2024

    What Skills Does a AI Researcher Need? In the rapidly evolving domain of artificial intelligence, the role of an AI…

  • Using Artificial Intelligence in Cybersecurity

    Using Artificial Intelligence in Cybersecurity

    AI has revolutionized the way IT security professionals think about cybersecurity. Newer AI-powered cyber security…

  • Emerging Robotics and AI Model Research

    Emerging Robotics and AI Model Research

    How valuable are humanoid robots? “If humanoid robots are able to operate at scale, they could generate ~$24 trillion…

  • 5 Influential Machine Learning Papers You Should Read

    5 Influential Machine Learning Papers You Should Read

    In recent years, machine learning has experienced a profound transformation with the emergence of LLMs and new…

  • Critical insights every company needs to know about information security!

    Critical insights every company needs to know about information security!

    What companies must know about information security – The essential insights! Information security (Infosec) is a…

社区洞察

其他会员也浏览了