Breach reports on banks usually deal with attempts to gain passwords and drain user accounts. However, attackers can also open or hack an account to use it as a transit point for a criminal transaction.
Anย American branch of the TD Bank was apparently used that way by an attacker who tried to trick a staffer in the financial office of security vendor Watchguard Technologies intoย wiring US$20,000 to the account as payment for some of the companyโs products.
As outlined last week in CSO Online, the attack started with a classic spear phish email from a person who purported to be the stafferโs manager, using the name in the โFromโ part of the email header. However, the emailโs source address was a seven-digit number at gmail.com. That, along with the fact that the request ignored the official chain of command and finance protocols, made the employee alert the company.
A Watchguard researcher then took over to pretend to be the employee, hoping to track down the attacker. The researcherย texted the attacker using a disposable phone number, who told the researcher about the urgent fund transfer to a TD Bank account. To trick the attacker who was expecting aย wire transfer confirmation message, WatchGuard masked the IP address of a honeypot server behind a URL-shortener and sent it to the attacker disguised as a confirmation link. The researcher then traced who clicked on that link. It came from Nigeria.
It isnโt known if the bank account was legitimately set up by the attacker, or if it was hacked. WatchGuard notified TD Bank about the matter, so we called them and asked if it had investigated and what it found. A bank spokesperson wouldnโt say much.
โAs always, the safety and security ofย customer information is a top priority for TD,โ the spokesperson said in an email Thursday. โWe have multiple safeguards in place, but in the event that a transaction is suspected of being unauthorized, weย conduct an investigation.ย There are steps everyone can take to help protect themselves against fraud, including: never sharing or writing down your Personal Identification Number (PIN) used forย account access cards or credit cards; regularly changing your passwordsย and ensuring banking credentials are different than day-to-day passwords (ex. email, online retailers); refraining from opening unexpectedย links or attachments;ย never disclosing personal, confidential or financial informationย via emails; and regularly reviewing your bank account and credit cardย statements for suspicious transactions.โ
The incident is another example of why โ despite the frustration of some CISOs on the effectiveness of warnings โ thorough security awareness training can be valuable, particularly among staff who handle money. Itโs also an example of how a well-trained security team can track down some information about attackers which may help defences.