SWIFT Bank Attacks Connected to North Korean Group Behind Sony Hacks

A

Alkajak

Thread author
Time is on the side of security researchers, who had the opportunity to take a closer look at the malware used in the Bangladesh SWIFT cyber-heist, and their conclusions are clear cut and almost unanimous.

According to reports from Symantec, BAE Systems, and Simon Choi of IssueMakersLab, the malware used in the SWIFT-based attacks closely resembles the one used by theLazarus Group, the notorious hacker and cyber-espionage crew behind the Sony hack and multiple others on governments and private enterprises.

Malware contained a "familiar" hard disk wiping function.

BAE Systems was the first one to spot the similarities two weeks ago, but security firms are known to mess up attribution once in a while. When today Symantec released its separate report on the malware used to infiltrate and carry out the Bangladesh $81 million cyber-heist, it's conclusions were almost identical.

Both companies said the file moutc.exe contained various code functions that were near identical with the ones spotted inside malware samples deployed by the Lazarus Group in the Sony hacks.

The similarity was in the "wiping function," used by crooks to delete traces of their activity on infected systems. The Bangladesh malware (Trojan.Banswift) contained this file, which Symantec researchers quickly tied to Backdoor.Contopee, a trojan used in cyber-attacks on financial institutions in South-East Asia in the past few years alongside Backdoor.Fimlis and Backdoor.Fimlis.B.

Full Article: SWIFT Bank Attacks Connected to North Korean Group Behind Sony Hacks
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top