The company continues to invest in North American market; will be opening three new regional offices in 2018
Kaspersky Lab experts reconstruct an ATMitch case – and discover a mysterious way to cash out with ATMs
Sint Maarten, Security Analyst Summit, April 4, 2017 - Kaspersky Lab experts announced research detailing how attackers are using unique tactics to withdraw money through remote administration from ATMs. The company investigated a bank ATM, where there was no money, no traces of physical interaction with the machine and no malware. After extensively researching this case, they were able to not only understand the cybercriminal tools used in the robbery, but also reproduce the attack themselves, discovering a security breach at the bank.
In February 2017 Kaspersky Lab published the results of an investigation into mysterious fileless attacks against banks: criminals were using in-memory malware to infect banking networks. But why were they doing this? The ATMitch case has given us the whole picture.
The investigation started after a bank’s forensics specialists recovered and shared two files containing malware logs from the ATM's hard drive (kl.txt and logfile.txt) with Kaspersky Lab. These were the only files left after the attack: it was not possible to recover the malicious executables because after the robbery cybercriminals had wiped the malware; however, this tiny amount of data was enough for Kaspersky Lab to run a successful investigation.
Erase / rewind
Within the log files from the investigation, Kaspersky Lab experts were able to identify pieces of information in plain text that helped them to create a YARA rule for public malware repositories and to find a sample. YARA rules — basically search strings — help analysts to find, group, and categorize related malware samples and draw connections between them based on patterns of suspicious activity on systems or networks that share similarities.
After a day of waiting, experts found a wanted malware sample – "tv.dll", or ‘ATMitch’ as it was later dubbed. It was spotted in the wild twice: once from Kazakhstan, and once from Russia.
This malware is remotely installed and executed on an ATM from within the target bank: through the remote administration of ATM machines. After it’s installed and connected to the ATM, the ATMitch malware communicates with the ATM as if it is legitimate software. It makes it possible for attackers to conduct a list of commands, such as collecting information about the number of banknotes in the ATM’s cassettes. What’s more; it provides criminals with the ability to dispense money at any time, at the touch of a button.
Usually criminals start by getting information on the amount of money a dispenser has. After that, a criminal can send a command to dispense any number of banknotes from any cassette. After withdrawing money in this unique way, criminals only need to grab the money and go. An ATM robbery like this takes just seconds!
Once an ATM is robbed, the malware deletes its traces.
It is still not known who is behind the attacks. The use of open source exploit code, common Windows utilities and unknown domains during the first stage of the operation makes it almost impossible to determine the group responsible. However, "tv.dll", used in the ATM stage of the attack contains a Russian language resource, and known groups that could fit into this profile are GCMAN and Carbanak.
“The attackers may still be active, but don’t panic,” said Sergey Golovanov, principal security researcher at Kaspersky Lab. “Combatting these kinds of attacks requires a specific set of skills from the security specialist guarding the targeted organization. The successful breach and exfiltration of data from a network can only be conducted with common and legitimate tools; after the attack, criminals may wipe all the data that could lead to their detection leaving no traces, nothing. To address these issues, memory forensics is becoming critical to the analysis of malware and its functions. And as our case proves, a carefully directed incident response can help solve even the perfectly prepared cybercrime.”
Kaspersky Lab products successfully detect operations using the above tactics, techniques and procedures. Further information on this story and Yara rules for forensic analysis of the fileless attacks can be found in the blog on Securelist.com. Technical details, including Indicators of Compromise were also provided to customers of Kaspersky Intelligence Services.
About Kaspersky Lab
Kaspersky Lab is a global cybersecurity company founded in 1997. Kaspersky Lab’s deep threat intelligence and security expertise is constantly transforming into security solutions and services to protect businesses, critical infrastructure, governments and consumers around the globe. The company’s comprehensive security portfolio includes leading endpoint protection and a number of specialized security solutions and services to fight sophisticated and evolving digital threats. Over 400 million users are protected by Kaspersky Lab technologies and we help 270,000 corporate clients protect what matters most to them. Learn more at www.kaspersky.com.
For the latest in-depth information on security threat issues and trends, please visit:
Securelist | Information about Viruses, Hackers and Spam
Follow @Securelist on Twitter
Threatpost | The First Stop for Security News
Follow @Threatpost on Twitter
Articles related to Virus News
NMW2017: Kaspersky Lab and AVL Software and Functions GmbH pave the way for secure-by-design connected cars
FRANKFURT, Germany – September 13, 2017 – In response to the rising cybersecurity challenges facing the connected and autonomous car industry, today Kaspersky Lab and AVL Software and Functions GmbH unveil the Secure Communication Unit (SCU) at New Mobility World / IAA 2017 in Frankfurt, Germany.