Cyber-Thieves Exploit Online Banking Weaknesses

by | May 24, 2011 | News

A recent attack by cyber-criminals has highlighted the need for many SMBs to re-evaluate the security protocols between themselves and their bank. Hackers exploit weaknesses in such systems, and when successful, can siphon tens of thousands of dollars from your accounts.

In a recent attack, cyber-thieves managed to get away with $63,000 after they exploited vulnerabilities in the online payroll system of a small business with its bank.

First, the crooks managed to infiltrate the company’s system through a piece of malware called the Zeus Trojan. This gave them access to the company’s data, including the password and username used in transacting with the company’s bank. The thieves then created several new ghost employees and created payroll accounts for them, which they sent to the bank and authenticated using the company controller’s username and password. And to cover their tracks, the hackers erased the confirmation emails regarding the transaction.

This incident highlights the need for better security systems in both the business and their bank as security experts cite online banking transactions as one of the favorite targets of cyber-criminals. Cyber-attacks such as this one exploit weaknesses in many existing systems that rely on very simple and automated authentication procedures to confirm transactions.

A direct threat to your business finances is not something to be taken lightly. You not only need to review your current online banking system, but also the current security protocols you have installed, since hackers and cyber-criminals are constantly updating Trojans and other malware to adapt to changing IT protection systems.

We encourage you to have us take a look at the systems you have in place to determine if you are at risk for attacks like these. Please do not hesitate to contact us and we will be happy to draw up custom security solutions that address your specific needs.

References:
Sold a Lemon in Internet Banking

Published with permission from TechAdvisory.org.

Related Posts

Happy Thanksgiving from Enstep Technology Solutions!

Happy Thanksgiving from Enstep Technology Solutions!

Whether you’re new to Enstep or you’ve been with us for a while, we want to wish you a happy Thanksgiving! It’s time to take time off work, enjoy a great meal, and spend time with your family. What are you thankful for this year? Here’s what the team at Enstep is...

What is the Future of IT Infrastructure?

What is the Future of IT Infrastructure?

As information technology continues to evolve and industries rush to keep up, individuals and businesses can’t always keep track of all the latest trends. Failing to develop new business strategies to adapt with the times can indicate trouble or perhaps even the final...

Planning for Migration from Windows 7 in 2020

Planning for Migration from Windows 7 in 2020

Windows 7, released in 2009 and appreciated by many PC users, will no longer receive general home support from Microsoft after January 14, 2020. In a nutshell, this means no more direct customer help (unless you pay through the nose for it), no more security updates,...

FIND OUT WHAT YOUR BUSINESS SHOULD EXPECT TO PAY
FOR HOUSTON TECH SUPPORT

Give us a call and discover how great local IT services and computer support can be!