Reported breaches involving zero-day bug at JPMorgan Chase, other banks

Share this article:
MitM attackers posing as banks, other major groups, tough to detect
Experts suggest that the attackers - believed to be Russian - took advantage of a zero-day vulnerability in a web application.

Citing an unnamed U.S. government official and other anonymous sources briefed by U.S. law enforcement, Bloomberg reported on Wednesday that JPMorgan Chase, as well as at least four other financial institutions, have been hacked.

“[The FBI is] working with the United States Secret Service to determine the scope of recently reported cyber attacks against several American financial institutions,” Joshua Campbell, supervisory special agent with the FBI, told SCMagazine.com in a Thursday statement.

The attackers – who are said to be Russian and state-sponsored – may have exploited a zero-day vulnerability in at least one bank's website, and then weaved through layers of complex security in order to gain access to sensitive information, the report indicates.

“Most probably, [the zero-day vulnerability was in] a common web application or a web server service, as this [zero]-day was also known to be used against other financial institutions,” Aviv Raff, CTO of Seculert, told SCMagazine.com in a Thursday email correspondence.

Lucas Zaichkowsky, enterprise defense architect with AccessData, told SCMagazine.com in a Thursday email correspondence that Eastern European attackers are well-known for exploiting web application security flaws to gain initial access into corporate environments.

“That's because web applications tend to be riddled with these types of vulnerabilities unless a Security Development Lifecycle (SDL) is strictly followed and the developers are highly skilled in secure coding practices,” Zaichkowsky said.

Gigabytes of sensitive data were stolen in the attacks, including information from employee computers and information that could be used to drain funds from accounts, according to the report, which adds that there have been no signs of money being moved from accounts or other fraud.

The motivations for the attacks are unclear – in a Thursday email correspondence, Armond Caglar, senior threat specialist with TSC Advantage, told SCMagazine.com that checking and savings account information could have been the reason these financial institutions were targeted, and Zaichkowsky agreed.

Page 1 of 2
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

Florida Supreme Court rules warrants a must for real-time cell location tracking

Florida Supreme Court rules warrants a must for ...

The Florida Supreme Court put the kibosh on warrantless real-time tracking using location data obtained from cell phone providers.

Modular malware for OS X includes backdoor, keylogger components

Modular malware for OS X includes backdoor, keylogger ...

The modular malware was named "Ventir," by researchers at Kaspersky.

Fake Dropbox login page nabs credentials, is hosted on Dropbox

Fake Dropbox login page nabs credentials, is hosted ...

Symantec researchers received a phishing email linking recipients to a fake Dropbox login page that is hosted on Dropbox's user content domain and served over SSL.