Saturday, July 13, 2024

North Korean HIDDEN COBRA Hackers Using New Attack Called “FASTCash” to Cash-out From ATM Machine

North Korean governments sponsored & worlds most famous hacking group HIDDEN COBRA using a new Attack called  “FASTCash” to cash out from the ATM Machine by compromising the bank server.

Attackers using a various mechanism to compromise and maintain the persistance in the victim’s network.

In this case, FBI & DHS issued a serious warning about this cyber attack and examines the tactics, techniques of FASTCash-Related Malware.

APT attackers initiating this ATM based attack mainly targeting against Africa and Asia based banks and still investigating this incident to confirm whether it targets any other origins.

Previous similar incidents conducted by HIDDEN COBRA hackers have stolen tens of millions of dollars and they enabled cash to be simultaneously withdrawn from ATMs located in over 30 different countries.

Another incident in this year same threat actors enable the cashout and withdraw money from ATMs in 23 different countries.

FASTCash scheme refers that an attacker remotely compromises payment switch application servers within banks to facilitate fraudulent transactions also attackers focusing on retail payment systems that vulnerable to remote exploitation.

How Does This FASTCash campaign Works

Initially, HIDDEN COBRA attackers targeting Bank employees using Spear phishing campaign in order to compromise the bank network but an exact infection vector of this campaign is still unknown.

Mainly they are using Windows-based malware to explore a bank’s network that helps to identify the payment switch application server.

Later attackers using some legitimate credentials to move further in bank network and access the switch application server using a specific pattern.

Based on the US-CERT Statement,some of the files used by HIDDEN COBRA actors were legitimate, and not inherently malicious, it is likely that HIDDEN COBRA actors used these legitimate files for malicious purposes. See MAR-1021537 for details on the files used. Malware samples obtained for analysis included AIX executable files intended for a proprietary UNIX operating system developed by IBM.

Once the bank switch application server successfully compromised then the threat actors deploy the legitimate script on the payment switch application server using command-line utility applications in order to intercept and reply to financial request messages with fraudulent but legitimate-looking affirmative response messages.

                                                                  Anatomy of a FASTCash scheme

Also, the APT group has highly skilled experts who all are having extraordinary knowledge in International Standards Organization (ISO) 8583—the standard for financial transaction messaging to deployed ISO 8583 libraries on the targeted switch application servers.

This helps to interpret financial request messages and properly form a fraudulent financial response message.

Finally, the injected malicious script basically alter the expected behavior of the server by targeting the business process, rather than exploiting a technical process. US-CERT said.

In this case, “U.S. Government recommends that network administrators review MAR-10201537 for IOCs related to the HIDDEN COBRA FASTCash campaign, identify whether any of the provided IOCs fall within their organization’s network, and—if found—take necessary measures to remove the malware.”

Also Read:

ATMJackpot – New ATM Malware Steal Your Money From ATM using ATM Jackpotting Technique


Latest articles

mSpy Data Breach: Millions of Customers’ Data Exposed

mSpy, a widely used phone spyware application, has suffered a significant data breach, exposing...

Advance Auto Parts Cyber Attack: Over 2 Million Users Data Exposed

RALEIGH, NC—Advance Stores Company, Incorporated, a prominent commercial entity in the automotive industry, has...

Hackers Using ClickFix Social Engineering Tactics to Deploy Malware

Cybersecurity researchers at McAfee Labs have uncovered a sophisticated new method of malware delivery,...

Coyote Banking Trojan Attacking Windows Users To Steal Login Details

Hackers use Banking Trojans to steal sensitive financial information. These Trojans can also intercept...

Hackers Created 700+ Fake Domains to Sell Olympic Games Tickets

As the world eagerly anticipates the Olympic Games Paris 2024, a cybersecurity threat has...

Japanese Space Agency Spotted zero-day via Microsoft 365 Services

The Japan Aerospace Exploration Agency (JAXA) has revealed details of a cybersecurity incident that...

Top 10 Active Directory Management Tools – 2024

Active Directory Management Tools are essential for IT administrators to manage and secure Active...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles