Malware reveals sophisticated understanding of operational processes

"For example, the malware was designed not just to alter SWIFT transactions, but also to hide their alterations, since all transfers get sent by SWIFT's software to a printer. "If the fraudulent transaction confirmations are printed out, the banking officials can spot an anomaly and then respond appropriately to stop such transactions from happening," he says. "Hence, the malware also intercepts the confirmation SWIFT messages and then sends for printing the 'doctored' - manipulated - copies of such messages in order to cover up the fraudulent transactions."

 

http://www.darkreading.com/attacks-breaches/malware-at-root-of-bangladesh-bank-heist-lies-to-swift-financial-platform/d/d-id/1325254?ngAction=register

Eric Rickard

Editor in Chief @ Andrew Magazine | Non-partisan Magazine Editor

9y

Good read. Provides a public example of how sophisticated the attackers TTP's are becoming.

Like
Reply

To view or add a comment, sign in

Others also viewed

Explore topics