Mobile Banking Malware vs Fraud Kill Chain
2024-2-27 19:1:32 Author: www.threatfabric.com(查看原文) 阅读量:13 收藏

This blog is the first of a series, where we will offer the tools to check your fraud detection capabilities for readiness on the most prolific fraud and scam types.

From Malware to Romance Fraud, we’ll analyze TTPs, Kill Chain mappings, and detection gaps. 

 
This first episode is about an upcoming trend: Mobile Banking Malware.  

The Problem 

Mobile Banking Malware is on the rise. In 2024, ThreatFabric spotted 75 families, of which 26 had Device TakeOver capabilities.

Screenshot 2024-02-26 at 15.43.42

Most of these malwares are delivered through official app stores. They involve a variety of tricks to steal information, and credentials, give Remote Access, or even Automate Transaction Stealing (ATS). One of the most prolific tools used is Anatsa. 

> View our recent research article on Anatsa

Detecting Mobile Banking Malware 

With the right tools, anti-fraud teams should be able to pick up the tell-tale signs of these attacks. The Fraud Kill Chain is a useful tool to identify detection opportunities and gaps. 

Screenshot 2024-02-26 at 15.43.58

Mobile Banking Malware vs Fraud Kill Chain 

We can see a plethora of TTPs identifying various stages of attacks before, during, and after. This means there is a lot of opportunity for detection, but it requires sensors and processes in digital channels.  

TF_CyberfraudKillchain_MobileBankingMalware_Details


Detection Gaps and Opportunities 

Gap 1: Mobile Visibility 

Our research reveals a significant Detection Gap: many organizations struggle with insufficient visibility into Mobile Channels, and some face similar challenges with Web Channels. Implementing effective sensors across these platforms can substantially elevate an organization's capability to detect threats proactively.

Gap 2. User Session Visibility 

The second most common gap is a lack of user journey visibility. A lot of tell-tale signs occur between App start and transaction signing: Credential Compromise, Account Access, and Defense Evasion. 

Gap 3. Device Risk 

The third most common detection gap is visibility on device risk. As the malware executes, it will exhibit tell-tale signs like misuse of accessibility permissions, use of screen overlays, sideload malicious code or bypassing authentication. 

Conclusion and Takeaways 

As cybercriminals evolve their mobile malware capabilities, anti-fraud teams are to perform the following checks: 

  1. Check your detection processes for mobile visibility, user session visibility, and device risk visibility. 
  2. Use the Fraud Kill Chain mapping to identify specific issues in your attack chain. 
  3. Consider adding detection technology if you identify gaps. 
  4. Stay up to date with the threat evolution with mobile threat intelligence 

Detection Readiness Workshop 

ThreatFabric helps banks and financials globally perform these analyses. If you’re interested in a detection readiness workshop, please contact us using the link below.


文章来源: https://www.threatfabric.com/blogs/mobile-banking-malware-vs-fraud-kill-chain
如有侵权请联系:admin#unsafe.sh