Zero day threats are nasty, insidious creatures that can be very hard to defend against. And what exactly are they? Zero day refers to the number of days the general...
Lessons learnt from cosmos bank attack
2 mins read
- Malware attack: The core banking system (CBS) of the bank receives debit card payment requests via a 'switching system'. During the malware attack, a proxy switch was created and all the fraudulent payment approvals were passed by the proxy switching system.
- ATMs compromised: When depositors withdraw money at ATMs, a request is transferred to the respective bank’s CBS. If the account has sufficient balance, the CBS will allow the transaction. In the case of Cosmos Bank, the malware created a proxy system that bypassed the CBS. While cloning the cards and using a ‘parallel’ or proxy switch system, the hackers were able to approve the requests – withdrawing over INR 80.5 crore in approximately 15,000 transactions.
- Reserve Bank of India (RBI) guidelines: RBI has clear guidelines to protect against incidents such as the Cosmos Bank attack which must be followed. The security measures across Indian banks are moderate and given the high level of coordinated international attacks, all banks need to upgrade their security mechanisms.
- Back up data regularly – verifying data integrity and testing the restoration process
- Secure your offline backups - ensuring backups are not connected permanently to the computers and networks they’re backing up on
- Audit firewalls, servers and Intrusion Prevention System (IPS) configurations - block access to known malicious IP addresses & Server Message Block (SMB) ports 139 and 445, and disable SMBV1 and Windows Management Instrumentation Command Line (WMIC) in servers and Active Directory (AD)
- Patch operating systems, software and firmware on devices - use a centralised patch-management system
- Scan all incoming and outgoing emails - detect threats and filter executable files from reaching end users using sandboxing
- Enable strong spam filters to prevent phishing emails - authenticate inbound email using technologies such as Sender Policy Framework (SPF), Domain Message Authentication Reporting and Conformance (DMARC), and Domain Keys Identified Mail (DKIM) to prevent spoofing
Leaders In Our Own Right
Explore related solution
The financial crash in 2008 plunged the world into a prolonged period of financial instability, leading to unemployment and a global decline in business profits due to a...
Banks, financial services, and insurance companies must expand their digital services in order to retain existing customers, and attract more. A secure network...
What’s next?
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators
Explore Our Solutions
Explore our solutions through immersive platform demos or engage with our surveys and pricing calculators