News

Global Hunt For Nigerian Cyber Criminal Spreading Malware

Global Hunt For Nigerian Cyber Criminal Spreading Malware
  • PublishedAugust 16, 2017

A Nigerian working alone around Abuja has stirred a global hunt as he orchestrated numerous malware infection campaigns targeting more than 4,000 organisations globally over the past four months, a cyber security company claimed.

www.Securityweek.com quoting Check Point security researchers said the attacks targeted various companies in industries such as oil & gas, manufacturing, banking, and construction, in an attempt to steal data and commit fraud.

Many of the companies are leading international names and some have had their defences breached by the attacks, the security researchers reveal.

According to Check Point, at least a dozen companies confirmed they have been infected during the campaign, including a marine and energy solutions company in Croatia, a transportation company in Abu Dhabi, a mining company in Egypt, a construction company in Dubai, an oil & gas firm in Kuwait, and a construction organization in Germany.

Despite the large scale campaign, behind it is not an expert gang of cyber criminals or a nation state actor, but โ€œa relatively unskilled man in his mid-20s, operating from a location near the capital of Nigeria,โ€ Check Point discovered.

Working on his own, the Nigerian uses fraudulent emails seemingly coming from oil and gas giant Saudi Aramco, the worldโ€™s second largest daily oil producer. The phishing messages target financial departments within companies in an attempt to trick employees into revealing company bank details or into opening a malware-infected attachment.

The malware used in these attacks includes NetWire, a remote access Trojan that provides its operator with full control over infected machines, and Hawkeye, a software for logging key strokes (malware already associated with Nigerian cyber criminals). The attacks eventually resulted in a total of 14 successful infections. The cyber criminal ended up earning thousands of dollars in the process, the researchers said.

Despite showing a low level of cyber-skills, using crude and unsophisticated fraudulent emails, with almost no research or social engineering involved in creating them, the attacker was successful in his attempts.

The attacker used generic email titles, phrased as โ€œDear Sir/Ms,โ€ sent the same email to numerous targets, โ€œall in blind carbon copy, urging victims to send back banking details, perhaps for future scams.โ€ He sent the emails from email addresses [email protected], and [email protected].

The fraudster used old, generic and readily available online malware, as well as freeware to โ€˜scrapeโ€™ email addresses from corporate websites and used them as targets for his campaigns.

โ€œThe fact that the campaign was still effective, despite using only basic cyber-criminal techniques, highlights just how much of a problem these business email compromise (BEC) attacks have become,โ€ Check Point said.

Since uncovering the campaign and establishing its origins, Check Pointโ€™s research team has notified law enforcement authorities in Nigeria and internationally and shared its findings with them.

Checkpoint said the Nigerian in his 20s operates social media accounts, where you he uses the motto: โ€˜get rich or die tryingโ€™.

His attack campaign uses fraudulent emails which appear to originate from oil and gas giant Saudi Aramco, the worldโ€™s second largest daily oil producer, targeting financial staff within companies to trick them into revealing company bank details, or open the emailโ€™s malware-infected attachment.

Last year, the FBI revealed that losses caused by BEC scams exceeded $3.1 billion. Victims are estimated to lose between $25,000 and $75,000 on average, per attack. However, itโ€™s not only financial losses that victims should be concerned about, but also the fact that โ€œthe malware used by the criminal to infect organizations gives remote control over infected machines, and can perform keylogging functions. This enables harvesting of a variety of information from infected machines, such as details on the companiesโ€™ operations, assets and intellectual property.โ€ Such details could be worth much more than the thousands of dollars obtained by fraud, Check Point says.

Another alarming aspect was that some of the targets are energy and infrastructure companies, which the unsophisticated cybercriminal was able to easily breach. Not only was the attacker able to compromise the networks of several large organizations, but he also managed to distribute his malware globally and remain under the radar for a long while.

โ€œThis highlights the need for all organizations to improve their security to protect against phishing and business email compromise scams, and to educate their employees to be cautious about opening emails, even from companies or individuals that they recognize,โ€ Check Point said.

Leave a Reply

Your email address will not be published. Required fields are marked *