2018 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise

As we enter 2018, the financial cybercrime landscape is evolving. IBM X-Force research has been tracking cybercrime activity around the world, and in a new report, examined the cybercrime shifts of 2017 and what financial institutions can expect to see in 2018. Last year saw the rise of new cybergangs and the demise of others, proving that only the fittest and most sophisticated survive in the dog-eat-dog world of cybercrime.

Survival of the Fittest

Rising awareness and the increasing effectiveness of banking controls mean that less sophisticated malware operators and smaller cybercriminal operations that rely on commercial codes are on their way out. Those with limited skills are simply unable to keep up with technological advances in banking security, especially in terms of machine learning and artificial intelligence.

Within that context, 2017 saw several notable exits of crime gangs that just couldn’t keep up. The Shifu Trojan, which emerged in Japan in 2015, departed from the scene this year after researchers noticed that its operators were using webinjections purchased from underground vendors. This outsourcing of code indicated that the group did not have its own developers and likely was not connected enough to operate globally.

Another banking Trojan, IcedID, which just emerged in the past year, is already reducing its activity. Its reliance on the Emotet group as a distributor suggests that the gang is not planning to spread aggressively or launch wider campaigns.

Organized Cybercrime Evolves

In 2017, Gozi activity outpaced that of Zeus Trojan variants for the first time. The group behind Gozi is considered a cybercrime-as-a-service operation, with links to an increasing number of actors across different geographical hubs. This new dominance proves that cybercrime is further evolving in the direction of organized, businesslike gangs.

Complex cybercrime organizations, such as those operating the Dridex and TrickBot Trojans, can employ dozens of people and include orchestration of the entire supply chain. These gangs target high-value marks, such as banks and their customers, all over the globe.

Sophisticated coding is another indication of a highly organized cybergang. As security technologies continue to improve in 2018, malware codes will need to constantly evolve to evade detection. To keep their attacks concealed, cybergangs such as Dridex, GootKit, TrickBot and IcedID use complex redirection attacks. Others, such as Client Maximus, which is currently targeting Brazil, use stealthy delivery tactics.

Big Wins for Law Enforcement in 2017

One encouraging trend is the number of malware exits that came about due to the efforts of law enforcement. Key members of the Neverquest, GozNym and Andromeda operations were successfully arrested in the past year. This likely influenced each of the gangs to disband or reduce operations. Europol’s takedown of the Avalanche cybercrime infrastructure in late 2016 also had significant impact on malware gang exits in 2017.

Malware Trends to Watch in 2018

Financial cybercrime is not expected to slow down in 2018. Rather, it is becoming the business of elite groups, evolving further toward complex, organized operations. Financial malware is already adopting ideas from high-profile attacks while cybercriminal groups increase their focus on high-value business targets and bank heists.

The IBM X-Force team is following all these malware trends. To learn more, read the new report, “Cybercrime Shifts of 2017 and What to Expect in 2018.”

Read the report: Cybercrime Shifts of 2017 and What to Expect in 2018

The post 2018 Financial Malware Trends and Predictions: Organized Cybercrime Continues to Rise appeared first on Security Intelligence.

Article Link: https://securityintelligence.com/2018-financial-malware-trends-and-predictions-organized-cybercrime-continues-to-rise/