{"id":10470,"date":"2018-02-28T05:00:05","date_gmt":"2018-02-28T10:00:05","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=10470"},"modified":"2020-04-10T15:42:24","modified_gmt":"2020-04-10T11:42:24","slug":"financial-threats-report-2017","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/financial-threats-report-2017\/10470\/","title":{"rendered":"Looking at the financial cyberthreats of 2017 through a business lens"},"content":{"rendered":"<p>Our experts analyzed the financial cyberthreats of the past year and published a thorough report on Securelist. The most disturbing fact for financial institutions is the rise of business target share: 19% of <a target=\"_blank\" href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/banker-trojan-banker\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" rel=\"noopener noreferrer\">banking malware<\/a> victims were corporate users. <\/p>\n<p>Apparently, cybercriminals began to shift their interest from consumers to businesses. It may be harder to infect businesses with malware, but it is definitely more profitable, because if they gain entry, they can get access to a company\u2019s financial resources. Although we saw a significant decrease last year in the number of financial malware victims (a 30% drop for the PC platform, 15% for Android) the share of corporate targets has risen. Now almost every fifth banking malware attack is focused on the corporate sector. In particular, we have registered a rise of ATM malware cases.<\/p>\n<p>However, phishing remains cybercriminals\u2019 favorite trick. Financial phishing usually targets consumers, but banks and payment systems also suffer when their clients are deceived. Last year we saw an increase in financial phishing: Our technologies detected 246,231,645 attempts to visit various kinds of phishing pages, and 53.8% of them tried to mimic banks, payment systems, or online stores.<\/p>\n<p>Another threat you should be aware of is a supply-chain attacks. As shown by the cases of ExPeter and ShadowPad, malefactors can infect with Trojan updates for the software that is used in financial institutions, among other places.<\/p>\n<p>You can find the <a target=\"_blank\" href=\"https:\/\/securelist.com\/financial-cyberthreats-in-2017\/84107\/\" rel=\"noopener noreferrer\">complete report on Securelist<\/a>.<\/p>\n<h2>Advice you can use<\/h2>\n<p>Your corporate infrastructure needs a multilayered and complex protection system. Every node in your network should be protected: from employees\u2019 workstations to servers, from ATMs to the queuing system\u2019s information panels. Endpoint protection is just a start; advanced detection and response technologies are necessary as well. On top of those, layer the following best practices:<\/p>\n<ul>\n<li>Teach your employees (for the hundredth time) not to click on links or open attachments from untrusted sources;<\/li>\n<li>Pay special attention to endpoints that are responsible for financial transactions. Their software \u2014 all software, including protective solutions \u2014 should always be up to date. Forbid execution of unauthorized software on those endpoints (i.e., implement a default-deny policy);<\/li>\n<li>Arrange special cybersecurity awareness training for those employees who work with online financial tools.<\/li>\n<\/ul>\n<p>We will hold a webinar to give IT security specialists a deeper understanding of the threats that await us all in 2018 and how they may affect business, and to share expertise on how to defend your business. You can <a target=\"_blank\" href=\"https:\/\/www.kaspersky.com\/blog\/financial-threats-announcement\/21269\/\" rel=\"noopener noreferrer nofollow\">join it or watch the recording afterward on BrightTalk<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our experts analyzed last year\u2019s financial cyberthreats, and here is their report<\/p>\n","protected":false},"author":700,"featured_media":10471,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1318,1917],"tags":[401,1030,36,76,585],"class_list":{"0":"post-10470","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-atm","10":"tag-finance","11":"tag-malware-2","12":"tag-phishing","13":"tag-report"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/financial-threats-report-2017\/10470\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/financial-threats-report-2017\/12644\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/financial-threats-report-2017\/14769\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/financial-threats-report-2017\/21351\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/financial-threats-report-2017\/9014\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/financial-threats-report-2017\/19754\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/financial-threats-report-2017\/19693\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/financial-threats-report-2017\/19715\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/finance\/","name":"finance"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=10470"}],"version-history":[{"count":11,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10470\/revisions"}],"predecessor-version":[{"id":16359,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/10470\/revisions\/16359"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/10471"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=10470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=10470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=10470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}