Banking Trojans or ‘bankers’ are one of the most widespread tools for cybercriminals as they focus on stealing money. Bankers usually search for users’ credentials for e-payment and online banking systems, hijacking one-time passwords, and then passing that data to the attackers.
A third of these attacks in 2019 targeted corporate users, an increase from the figure (24%-25%) that has remained fairly consistent for the previous three years. According to experts, the rationale of this is clear: attacks on the B2B sector could not only provide access to banking or payment system accounts, but, through employee exposure, could also compromise a company’s financial resources.
The collected data also shows that Russia held its position as the most targeted nation in 2019, accounting for more than 30% of global users attacked by banking malware. It is followed by Germany (with a share of over 7%) and China (more than 3%).
“While the overall number of attacks with bankers decreased in 2019, the growing interest for corporate users’ credentials indicates we are not yet seeing respite from financial threats. We therefore ask everyone to stay cautious when conducting financial operations online from PCs. While we are in the current peak of remote working during the coronavirus pandemic, it is especially important to not underestimate criminals’ desire for stealing money,” said Oleg Kupreev, security expert at Kaspersky.
The key findings of the report are:
Banking malware (Windows):
Android banking malware:
Kaspersky experts advise businesses take the following measures against financial threats:
To learn more about financial phishing and the other findings from the report, Financial Cyberthreats in 2019, read our blogpost on Securelist.com.