New Report Shows Mobile Banking Cyberattacks on the Rise
A report from Check Point Research shows that weaknesses in our mobile device usage and with online merchants are endangering our personal data.
It all starts simply enough. You download an app that you believe is for your bank. You didn’t pay attention to the website where you downloaded it from, but it all looked legit. The app — during installation — asked for access to your Accessibility Services. Imagining that this is harmless, you grant it. For months, nothing happens; everything works as it should.
One day, though, you find yourself locked out of your account for some reason. When you call the bank, you find that the funds in your account are gone. You have become the latest victim of a malware attack. Per a new report from Check Point Research, you are not alone.
According to the cybersecurity firm, cyberattacks on mobile banking increased by 50% in the first half of 2019, year-to-year. “Surprisingly, mobile banking malware requires little technical knowledge to develop, and even less to operate,” Maya Horowitz, director of Threat Intelligence & Research for Check Point Research, said per the firm’s 2020 Cyber Security Report.
“The malware searches for a banking app on the infected device and creates a fake overlay page once the user opens it. The user will then enter the user’s credentials, sending it directly to the attacker’s server.”
An Attack on Our Devices
As we increasingly rely on mobile devices, the opportunity for hackers to steal our personal information rises. The more complex the connection security, the harder it will be for devices to connect to Wi-Fi or public data networks. As such, developers must take a balanced approach to entry security where the connection between the device and the network is strong enough to protect both while being permutable enough to allow the device to connect in the first place.
It is in this compromise that hackers can and do steal personal data. A smartphone, for example, that is set to automatically connect to open public Wi-Fi connections may inadvertently stumble onto a hacker’s hotspot. Without realizing it, a smartphone user may be transmitting all of his/her personal data and credentials through someone’s personal device, where it is filtered, copied, and stored for use later.
As finding the infected code would require a line-by-line analysis of the code stack, and as code injectors are used for legitimate reasons, as with Google for analytics, Magecart has become a hard-to-contain menace. Magecart has been accused of skimming credit card data from MyPillow.com, Amerisleep.com, UK Ticketmaster, British Airways, NewEgg, Topps, Forbes, and hundreds of college bookstores.
This reflects a new attitude of escalation among hackers. Increasingly, hacking groups are working together to beat encryptions and other network protections. This is reflected in the rise of ransomware in 2019. Many of these attacks used collaborated software, such as Emotel. These attacks also are typically a collaboration regarding man-hours and actual work done.
“Rather than immediately deploy a ransomware, offenders often spend weeks exploring the compromised network to locate high-value assets as well as backups, thus maximizing their damage,” Check Point researchers explain. “Ironically, companies that try to protect their data by using cloud services occasionally find that their service provider itself has been targeted.”
The road forward for cybersecurity, per the report, is to take a holistic approach. It may be necessary to install nano security devices on mobile devices, which independently serve as a firewall. It may also be necessary to extensively build out our cybersecurity infrastructure to include artificial intelligence, cloud computing, and other innovations. Most important, though, we must develop a proactive attitude toward security.
“We don’t yet have the benefit of hindsight to show exactly what security threats we will face in 2020,” the report concludes. “Today’s hyper-connected world creates more opportunities for cybercriminals, and every IT environment is a potential target: on-premise networks, cloud, mobile, and IoT devices. But forewarned is forearmed. By using advanced threat intelligence to power unified security architectures, businesses of all sizes can automatically protect themselves from future attacks.”