Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Zeus Found Targeting Canadian Payroll Processor

Researchers at Trusteer have spotted a new attack vector from Zeus that aligns perfectly with previous financially motivated targets. Based on the information collected and previous attacks, it appears as if the newer Zeus configurations will remain focused on the bigger fish.

Researchers at Trusteer have spotted a new attack vector from Zeus that aligns perfectly with previous financially motivated targets. Based on the information collected and previous attacks, it appears as if the newer Zeus configurations will remain focused on the bigger fish.

Trusteer managed to capture a Zeus sample that is targeting Ceridian, a Canadian HR and payroll services firm. Once installed on a compromised host, Zeus will capture a screenshot of Ceridian’s client portal, allowing the malware’s controller access to the User ID, Company Number, and the image-based authentication icon. In addition, the keylogging aspect of the malware will ensure that the password is compromised. With this information in hand, the attacker can compromise the account at will.

Trusteer notes that compromises such as this one can be devastating to a company. Last August, criminals walked with more than $200,000 after compromising a system used by the Metropolitan Entertainment & Convention Authority (MECA).

Such scams are expected to increase, Trusteer notes, because enterprise payroll systems offer access to larger sums of cash. Moreover, access to a large organizations payroll system allows the attackers a better chance of funneling money out to mules before any red flags are raised.

Not to mention, there is a good chance that cloud-based payroll systems are able to be accessed with unmanaged mobile devices, allowing the crooks an additional avenue of compromise that could go undetected for some time.

The larger problem however, is one that most companies have no real means to defend against; as it’s out of their control once they use external services.

“By targeting a cloud service provider, the criminals are bypassing tight security mechanisms that are typically employed by medium to large enterprises. In a cloud service provider environment, the enterprise customers who use the service have no control over the vendor’s IT systems and thus little ability to protect their backend financial assets,” said Trusteer’s Amit Klein in a blog post.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.

CISO Strategy

Okta is blaming the recent hack of its support system on an employee who logged into a personal Google account on a company-managed laptop.

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...