Presentation is loading. Please wait.

Presentation is loading. Please wait.

Business Process Compromise in Financial Institutes Kavya Kushnoor

Similar presentations


Presentation on theme: "Business Process Compromise in Financial Institutes Kavya Kushnoor"— Presentation transcript:

1 Business Process Compromise in Financial Institutes Kavya Kushnoor

2 Objectives: Business Process Business Process Compromise
Features of BCP Some detected malware names Examples of Infamous Attacks Precautionary Measures

3 What is a Business Process?
It is a structural representation of the flow of activities in an organization and consists of stages and steps of a business process. These are unique for each industry and company. Example: Loan eligibility determination (in picture)

4 What is a Business Process Compromise?
It is a type of cyber attack where an attacker looks for loop-holes in business processes, vulnerable systems and susceptible practices which are handled by machines

5 Features of BCP A susceptible business process which is completely automated and machine run Once a vulnerability is identified, the hacker manipulates the machine without the employee’s knowledge The employee trusts the policies to work as usual while the attackers have access to funds and valuable data The attacker is motivated by fraudulent financial gains Time taken to identify it is generally 5 months on average

6 Variants of detected malware:
TROJ_RATANKBA.A. BKDR_DESTOVER.ADU BKDR_DESTOVER.A TROJ_CVE B SWF_EXPLOYT.YYRQ TSPY64_BANKER.YWNQD BKDR64_KLIPODENC.ZHEB-A TROJ64_KLIPODLDR.ZHEB-A

7 Some Infamous Attacks:
Bank SWIFT Communication Lines Fed Reserve Bank of NY Install malware to manipulate communication 2016 Bangladesh bank incident ($81 million) Tien Phong Bank (Vietnam) ($1.3 million) Banco del Austro (Ecuador) ($12 million) Link Requests fraudulent transfer of $$ Tamper with Printing system to avoid discovery of fund transfer

8 Precautionary Measures
Secure network against malware using technologies like endpoint protection and security solutions System lockdown for critical applications Regular audit and analysis of policies Vendor evaluation and risk assessments Educate and train employees to detect abnormal behavior and social engineering attacks Features Link

9 Links analysis/predictions/2017 threats/security-101-business-process-compromise protection/sps.html?cm_mmc=VURL: /us/enterprise/network-security/interscan-web-security/index.html-_-1:1 and-other-financial-organizations-hit-by-new-malware-attacks


Download ppt "Business Process Compromise in Financial Institutes Kavya Kushnoor"

Similar presentations


Ads by Google