Kaspersky Lab IDs New Activity Among Financial Cybercriminals

Shutterstock

Analysts at Kaspersky Lab have discovered a string of attacks targeting users across Asia and Africa, the company said Wednesday (Nov. 23).

    Get the Full Story

    Complete the form to unlock this article and enjoy unlimited free access to all PYMNTS content — no additional logins required.

    yesSubscribe to our daily newsletter, PYMNTS Today.

    By completing this form, you agree to receive marketing communications from PYMNTS and to the sharing of your information with our sponsor, if applicable, in accordance with our Privacy Policy and Terms and Conditions.

    Experts have identified cyberattacks that use what’s called a zero-day exploit, a program that allows additional malware to be installed on a device without the user’s knowledge. The attacks are hitting the InPage text editor software used by businesses with employees that speak Urdu and Arabic.

    According to Kaspersy Lab, the attacks are pinpointing businesses in Asia and Africa.

    Media and printing companies are some of the most common users of the InPage program, the firm noted, though government offices and financial institutions also use the software. Nearly 2 million people use InPage, but researchers have identified Myanmar, Sri Lanka and Uganda as the three areas in which attacks have occurred.

    Researchers said this cyberattack uses a phishing email scam with malware attached. The attacks are using particular kinds of tools and technologies commonly seen among financial cybercriminals, Kaspersky Lab said.

    “The use of vulnerabilities in specific software with a relatively low global presence and a very narrow target audience is an easy-to-understand tactic,” said Kaspersky Lab GReAT security expert Denis Legezo in a statement. “The attackers adjust their tactics to their target’s behavior by developing exploits for custom software, which doesn’t always receive the kind of scrutiny that big software companies apply to their products.”

    Advertisement: Scroll to Continue

    “Since local software is not a common target of exploit writers, vendors are not very responsive to vulnerability reports and existing exploits remain workable for a long time,” the executive added.

    The company has recommended that companies implement security solutions across the enterprise and focus on employee education to prevent these types of attacks. Staff should understand how to identify a suspicious email and to not open attachments from these messages.