{"id":350,"date":"2006-05-15T00:00:00","date_gmt":"2006-05-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/15\/social-engineering-replaces-guns-in-bank-heists\/"},"modified":"2021-12-30T11:37:05","modified_gmt":"2021-12-30T11:37:05","slug":"social-engineering-replaces-guns-in-bank-heists","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/15\/social-engineering-replaces-guns-in-bank-heists\/","title":{"rendered":"Social engineering replaces guns in bank heists"},"content":{"rendered":"<p>Australia&#8217;s banking industry is under threat due to a heavy reliance on Single Socket Layer (SSL) encryption that hackers increasingly find their way around.  There are no &#8216;stick-em-up&#8217; dramatics in today&#8217;s million-dollar bank heists, it simply involves the use of SSL-evading Trojans and refined phishing techniques.  While banks are reluctant to quantify financial losses, Australia&#8217;s Computer Emergency Response Team (AusCert) admits its own research proves attacks are on the rise.  AusCert general manager Graham Ingram said a false sense of security surrounds SSL encryption, a technology in use right across the financial services industry.   This reliance on Internet browser encryption means banking sessions can be hijacked by Trojans and key-logging programs especially if users engage in lax security protocols and don&#8217;t use current anti-virus signatures.  The bottom line is that social engineering tricks are circumventing Internet banking encryption.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ingram said there is a belief that customers are safe and privacy is protected through the use of SSL but &#8220;this is not the truth&#8221;.  His statement was backed up by AusCert&#8217;s analysis and assessment manager Kathryn Kerr, who said it is a serious issue for any organization offering Internet banking as well as anyone using VPNs or remote work.<\/p>\n<p>Neal Wise, director of security firm Assurance Pty Ltd., said SSL does serve a good purpose but leaves users prone to a &#8220;man in the middle&#8221;-type attack.  &#8220;Unfortunately the only controls a bank can rely on for users to transport data is SSL encryption; it leaves them in an interesting situation having to cover related security issues they have not created,&#8221; Wise said.  &#8220;We will see financial institutions, as part of shoring up their own risks, providing cut-price antivirus and content checking tools for their clients, because right now if someone manages to put a keystroke logger on a client computer, and a banking session gets recorded, banks have to cover that risk and it is not their fault.&#8221;<\/p>\n<p>While security experts claim Internet banking fraud drains as much as two to five percent of revenue, the financial services industry isn&#8217;t as forthcoming when it comes discussing online threats, and the Australian Bankers Association (ABA) refuses to comment.<\/p>\n<p>http:\/\/www.computerworld.com\/action\/article.do?command=viewArticleBasic&#038;articleId=9000457&#038;source=rss_news85<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[],"class_list":["post-350","post","type-post","status-publish","format-standard","hentry","category-financial"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/350","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=350"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/350\/revisions"}],"predecessor-version":[{"id":2837,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/350\/revisions\/2837"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=350"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=350"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=350"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}