About Us | Contact Us
View Cart

The Anatomy of a CAT Attack

By Dan Hadaway | Tuesday, August 27, 2013 - Leave a Comment

In order to understand the power of the three layers of security required by the June 2011 Supplement to the FFIEC’s 2005 Guidance on Authentication in an Internet Banking Environment, it is helpful to understand just how a corporate account takeover (CAT) attack works. Nowadays, criminals can purchase applications that are designed to attack American banks. One such application, Zeus, thought to be sold by the Russian Business Network for around $4500, comes with optional modules used to compromise various controls.


Even true two-factor authentication will not always thwart such an attack. During the monitoring phase of the attack, upon recognizing the means of two-factor authentication being used, if the value in the account is high enough, the criminal can justify purchasing additional modules to the application that will allow a compromise of the multi-factor authentication control. For example, if the victim’s bank uses key-fobs for the “what-you-have” authentication, the bad guy can install a remote control module of the malware, and then simply use the remote control functionality to wiggle the victim’s mouse after a legitimate internet banking session to keep the session open and, once it is clear the victim is no longer paying attention, execute a transfer of funds.

If banks teach customers not to rely solely on the time-out features of the system, and thus should log out after finishing their banking, the veracity of the bank’s two-factor authentication solution is enhanced. Likewise, if a bank has a detect and response system in place, they can stop fraudulent transactions before damages are experienced, or at least minimize the damages.

Institutions still relying on a one-dimensional approach offered by their vendors are fooling themselves. Criminals want to know who these institutions are, because they know the likelihood of breaching that institution will be much higher with those that are not implementing all three layers of protection!


Latest News
    from Dan’s New Role . . . And note the date! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Once again, I am turning over a new leaf.  Those who have not been following this blog for its full fourteen-year history might not realize […]
    Top Seven Risks . . . that small bank Information Security Officers face in 2023! When we present audit reports to boards of directors, we also talk to the board about the top risks the institution is facing. Since 2006, we have been compiling a list of the “top seven risks small institutions are facing,” in […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    The new plan calls for technology providers, and not end users, to be responsible for security… An article review.  Following multiple high profile cybersecurity incidents in 2021 and 2022 the Biden Administration recently announced new long-term goals for the nation’s cybersecurity, and under the new plan companies that provide technology would carry more of the […]
    R7: 2023’s Top Seven Technology Risks Webinar-Video What are the top seven risks your board should know about in 2023? Since 2006, Dan has been compiling a list of the “top seven risks small institutions are facing,” in preparation for his board presentations. This webinar will present the 2023 list in a manner that you […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    Times they are a-changin’ . . . The infotex website is being updated. You read that right! We are in the process of updating our website from the circa 2013 version we have had for far too long. As the Digital Media Manager for infotex this excites me greatly and I look forward to the […]
    A new Team member’s first article! In today’s news cycle, it is difficult to miss all the fuss about AI, or more specifically, ChatGPT. So many differing opinions on the matter can make it hard to decipher what the future looks like. Few people think AI is a gimmick, but not many know the possibilities […]
    A draft version of the new framework may be available as early as this summer… An article review. As the cybersecurity landscape is constantly evolving, the tools we use to address risk need to evolve as well–and by this summer we should be getting our first look at planned changes to the NIST cybersecurity framework.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]