The SenseCy Cyber Intelligence team, along with our partners ClearSky and Aman Computers, has been providing intelligence monitoring services for leading financial institutes in Israel for over a year. Our unique methodology of using “Virtual Entities” to infiltrate cyber-attack groups and the underground has proven successful in alerting regarding imminent cyber threats, as well as detecting new Malware types and monitoring broader cyber trends.
The following is an extract of an annual report sent to our customers. To receive a copy, please send a request to: email@example.com
This report comprises an analysis of data amassed from major cyber incidents pertaining to financial institutions in Israel over the past year, as reflected in the alerts, weekly and monthly reports produced by our Cyber Intelligence team. The analysis can be summarized as follows:
- The majority of Hacktivist campaigns were directed against the government and financial sectors.
- Interestingly, we have found no correlation between the attack dates and any symbolically significant dates.
- The main threat actors were political activists and political cyber warriors.
- The more popular attack types were data leakage (exploitation) attacks, resource depletion attacks, injection attacks and social engineering attacks.
Additionally, the report includes an analysis of data collected on the sale of attack tools on underground forums (mostly Russian). The analysis comprises 42 tools and exploits, summarized as follows:
- The most popular tools for sale on the underground are bots and exploits (some sold as exploit kits), followed by Trojan horses.
- Their main purpose is stealing financial information.
- The main functions of the tools sold included running Web injection attacks and grabbers, intercepting and forwarding SMS messages and calls from cell phones, Keyloggers, and DDoS attack tools.
- Java was the program identified as most vulnerable to attack.
- The most vulnerable Web browser was Internet Explorer, followed closely by FireFox.
- The most vulnerable operating system was Windows.
This summary is based on major cyber events pertinent to the financial sector, as published in the various reports we issued throughout the year. The analysis is based on data from over 40 cyber events.
The majority of incidents reported are specifically relevant to the financial sector, but also include a category for general threats to Israeli websites, mainly from political threat elements. This classification is evident in the graph below, with the leading threats being financial, data loss, defacement and DDoS.
Timeline of Events 2013
Classification of the Sale of Attack Tools on the Underground
The summary was based on all malware/exploit sales for the past year that appeared on underground forums, mainly Russian forums, monitored by us – more than 40 in total. The majority of tools for sale are bots, followed by exploits or exploit kits. Trojan horses are also offered for sale, but less frequently.