The surge in demand for cashless banking payments in the Asia Pacific (APAC) region may have brought convenience and safety to people. But it has also brought in more cyber-attacks, particularly Trojans, which is often described as a “malicious software” that may appear legitimate to trick users.
Vitaly Kamluk, director of Global Research & Analysis Team (GReAT) for APAC at Kaspersky, said the increased cashless payments in APAC “have paralleled the rise of banking Trojans in the region.”
“Even before Covid-19, Asia Pacific has always been one of the leaders in digital payment adoption, driven by developed countries like China, Japan, South Korea, and even India. This pandemic extended the use of this technology significantly further – particularly in still emerging economies in Southeast Asia and South Asia,” Kamluk said.
He added that “lockdown restrictions forced everyone to shift their financial transactions online.”
“But now, after analyzing the historical figures we have on financial threats, I also learned that there was another outbreak that started in early 2019 in APAC – banking Trojans,” he warned.
He said these banking trojans focus on “financial and opportunistic attacks in the region.”
Covid-19, which was first detected in December of 2019, has drastically changed multiple aspects of human lives globally and in APAC. One of its most evident aftermaths is the significant uptick of digital payment adoption in the region.
Kamluk said banking Trojans are one of the most dangerous species in the malware world. To put it simply, they are used to steal money from users’ bank accounts.
The goal of this malware is either to obtain access credentials or one-time passwords to online bank accounts or to manipulate the user and hijack control for the live online banking session from the legitimate owner.
Due to the uptick of online payment usage and the still-needing-improvement consumer attitudes towards protecting their devices, banking Trojan is among the most impactful malware for home users.
Kaspersky said a decade long historical data analysis showed that South Korea was among the pioneer countries in APAC that suffered from banking Trojans throughout 2011-2012. However, since 2013 it showed significantly low relative numbers of infections and currently is at the bottom of the list of banking Trojans infected countries in the region.
Most of other developed countries show low statistics of banking Trojans detection too, while developing countries seem to have become and remain a hot spot for the criminals since 2019.
“Banking Trojans were not the biggest concern of many countries in APAC until 2019 when an outbreak of infections appeared in multiple countries at once. From then on there was no looking back. Our telemetry shows that this malicious threat has grown in terms of detections and reach. We see that it will continue to pose a significant threat to both financial organizations and individuals here as we continue to see more users and startups dipping their feet into the digital payments field,” Kamluk said.
In terms of regional distribution, the Philippines logged the highest number of unique users attacked in APAC at 22.26% of all banking Trojans discovered in the region, followed by Bangladesh (12.91%), Cambodia (7.16%), Vietnam (7.04%), and Afghanistan (7.02%).
Kamluk also listed the types of financial threat actors, based on an analysis of almost 300 publicly reported financial sector cyber-incidents since 2007. These include:
- Non-state actors (cybercriminals) – individuals or criminal groups seeking personal gains and illegal profit. Often interested in unauthorized access to sensitive payment processing systems, ATM networks, but also running blackmailing after DDoS or ransomware attack. The result of such attacks are either disruption of business operations or money theft.
- State-sponsored – organized skilled hackers, more likely on a payroll. Their job is to sneak behind enemy lines at other nations’ sensitive networks to map assets, install malicious backdoors, and even to conduct massive financial heists in some cases.
- Insiders – a day in the office of these threat actors involves stealing corporate intellectual property, either to resell for personal profit or to further the objectives of the nation-state that employs them.
- Multiple actors – a combination of the abovementioned types.
- Unknown – this is not an attacker type by itself, it simply includes all cases where it wasn’t clear who was behind the attack.
“The proportion of the unknown has grown over time, which is an alarming trend. With the growth of the number of attacks, there seems to be an alarming trend of financial institutions becoming less and less capable of identifying who attacked them. The unknown, unidentified threat actors were behind 60% of the attacks in 2020, but this number will likely grow up to 75% this year,” he said.