Banks on Security Alert Against Keyloggers

High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to banks and financial institutions.

See Also: How to Scale Your Vendor Risk Management Program

Recently, Englandâs High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London.  The gang gained access to Sumitomo Corp.âs computer systems, installed keyloggers in order to learn usersâ passwords, and were getting set to transfer the money to 10 bank accounts scattered around the globe when they were discovered.

Growing Threat

So what exactly is keylogging?  Itâs the practice of using a small hardware device or (more commonly) software to record every action performed at a given computerâs keyboard.  Once keylogging software is installed, itâs a relatively simple matter for hackers to analyze it to learn sensitive information such as credit-card and bank-account numbers, user names, and of course passwords.

Keylogging is far from new; for several years, itâs been spread through e-mail viruses.  And â-communityâ" PCs in such places as airports and libraries have been found with hardware keyloggers installed. 

Consumers who fall prey to keylogging may find fraudulent activity in their various online accounts.  Now, as evidenced by the Sumitomo case, online criminals are upping the ante by going after corporate information.

Webroot, a security firm, says 15% of the PCs it tests have some sort of keylogging installed. 

Whether youâre at work or at home, you should follow basic security procedures to prevent a keylogger from being installed on your computer:

  • Never click on attachments in e-mail unless you know they are legitimate.
  • Use good anti-virus software, and update it regularly.
  • Scour your home PC by running a reputable spyware-finding program, such as Lavasoftâs Ad-Aware.

© National Security Institute, Inc.  â" This article is the property of the National Security Institute and may not be copied or redistributed in any fashion without an appropriate licensing agreement.  For more information and FREE samples, visit http://nsi.org/SECURITYsense2.html .


About the Author




Around the Network