In both attacks, phishing emails allowed the criminals to gain access to the bank’s IT infrastructure.
While companies continue to invest heavily in employee training and technologies to thwart phishing attacks, purposeful hackers continue to succeed with varying tactics, whether it’s with insider accomplices, credential harvesting, malicious macros, or social engineering.
Once hackers breach an organization, it becomes very difficult for traditional cyber security tools (SIEM/Anti-Malware/etc.) to detect and stop them.
Once the hackers infiltrated the bank’s network, their next moves were all too familiar; enumerate the environment, identify privileged accounts, laterally spread to other devices and networks, and obtain privileged credentials.
These activities occur in almost all modern day attacks. In this particular attack, the hackers gained administrative privileges and laterally spread to key financial networks (STAR network and Navigator) to alter debit card anti-fraud protections to allow millions of dollars to be withdrawn from ATMs.