Solutionary researchers also offer advice on how regular users can pitch in

Oct 12, 2012 10:45 GMT  ·  By
Solutionary advises banks to review their authentication procedures for wire transfers
   Solutionary advises banks to review their authentication procedures for wire transfers

According to a report released by the RSA, United States financial institutions should expect to become the targets of cyberattacks. The agency wasn’t referring to the distributed denial-of-service (DDOS) attacks launched by hackers in protest against the Innocence of Muslims video, but the campaign called Project Blitzkrieg.

Project Blitzkrieg is said to rely on a Trojan called Gozi Prinimalka to intercept wire transfers made by the banks’ customers with the purpose of emptying their accounts.

To ensure the operation’s success, the initiators want to target 30 unnamed banks with the help of 100 botmasters that could help in sustaining the attacks.

Researchers from information security firm Solutionary once again highlight that this operation leverages the weak state of security surrounding financial institutions, especially those from the United States.

“Solutionary highly recommends banks review authentication procedures for wire transfers. If not already in compliance with Federal Financial Institution Examination Council (FFIEC) requirements, getting in compliance is a great start,” Robert Jeffries, research analyst at Solutionary’s Security Engineering Research Team (SERT), explained.

The expert warns that one way or the other – directly or indirectly –, this campaign will result in a DDOS attack and not only the targeted companies should be prepared to handle it, but also regular users. That’s because the botnets utilized in massive DDOS attacks are in many cases composed of their work or home computers.

“Sure, this attack could be using computers from a specific source, but without knowing for sure it’s not worth the gamble. As a precaution, ensure your systems are patched and the anti-virus is updated. Also be mindful of your emails,” Jeffries added.

Internauts who want to make sure that their computers are not infected with malware and, implicitly, part of a botnet, should look for suspicious outgoing connections, sudden redirects while surfing the Web, delays in system startup and shutdown, and failures in antivirus updates or scans.

Other signs of an infection include the “mysterious” disappearance of files, unusual system performance and browser crashes.