SURVEY: 1 IN 2 BUYERS REQUIRE CSR IN PROCUREM... » Almost half of buyer documents (48 per cent) seen by electrotechnical businesses with turnover above... G4S Africa supports small business development thr... » The latest product in the G4S Deposita range is a smart safe system called mini-pay that holds up to... Commissioner's statement following incident in Man... » This is an utterly appalling attack. My thoughts are with the people of Manchester as they try to co... UPDATE: Policing events in the Capital » Following the horrific terrorist attack in Manchester last night, in which 22 people were killed and... Statement from Assistant Commissioner » Statement from Assistant Commissioner Mark Rowley, Head of National Counter Terrorism Policing: The... Met intensifies policing activities in London fol... » The Metropolitan Police Service (MPS) has increased police numbers and operations across the Capital... OF FOOLS OF THE MIDDLE BELT, ONE NORTH AND PASTORA... » Please visit also: www.scorpionnewscorp.com SERIES: BUHARISM AND THE FIERCE URGENCY OF NOW A treat... Home Secretary’s statement on the Manchester attac... » I know that some people will only just be waking up to the news of the horrific attacks in Mancheste... Checkpoint Systems unveils Bug Tag 2 loss preventi... » Checkpoint Systems has announced the launch of Bug Tag 2 – an innovative loss prevention solution th... Edesix launches new head and torso mounted body wo... » Edesix has announced the launch of new head and torso mounted cameras. The X-100 is a side-mounta...

CLICK HERE TO

Advertise with Vigilance

SOCIAL BOOKMARK

Got News?

Got news for Vigilance?

Have you got news/articles for us? We welcome news stories and articles from security experts, intelligence analysts, industry players, security correspondents in the main stream media and our numerous readers across the globe.

READ MORE

Subscribe to Vigilance Weekly

Information Security Header

According to US Attorney Loretta Lynch, "This was indeed the largest theft of this type that we have yet seen. This was a 21st century bank heist that reached through the Internet to span the globe. But, instead of guns and masks, this cybercrime organization used laptops and malware."

 

According to George Tubin, Senior Security Strategist, Trusteer, “It appears the criminals in this case used advanced malware to breach the corporate network of two unnamed credit card processors that process prepaid debit card transactions. This type of breach almost always starts with an employee PC being compromised with malware in order to gain a foothold into the corporate network. Once inside the corporate network, the criminals can do what they want - and this massive heist clearly demonstrates the free reign afforded the cybercriminals to alter highly sensitive, highly protected information to ultimately steal $45 million. Despite using market-leading endpoint and network protection solutions most large enterprises are (knowingly or unknowingly) still breached by advanced malware.”

Tubin continued, “The only way to prevent these attacks is to prevent advanced, information-stealing malware from compromising employee endpoints - the weakest link in the security chain - and then moving the attack inside the corporate network. Corporate breaches can only be prevented by stopping malicious files from invisibly sneaking onto employee computers through both unknown and unfixed software flaws (aka, vulnerabilities). Because, once malware infects the user's computer, it's game over.”

“While this particular crime was highly visible due to the stolen funds, many corporate breaches go unnoticed as sensitive corporate data and highly valuable intellectual property are siphoned electronically out of the corporate network”, he said.