alphaspirit - Fotolia
I know the importance of additional authentication measures, but I'm seeing reports of banking malware that can now bypass two-factor authentication. How does this banking malware work, and what should enterprises do to defend against such threats?
Banking malware Vawtrak has functionality to bypass two-factor authentication included in its code. It doesn't actually exploit a vulnerability in the two-factor authentication mechanism itself, but instead uses social engineering to trick the user into entering the 2FA token code so the malware can capture it and use it on the website attackers are targeting. Vawtrak infects a user's endpoint device and modifies the targeted financial institution's webpage that generates a phony prompt for the 2FA token.
Financial institutions under attack by this type of banking malware could potentially detect the suspicious activity and then block any financial transactions via infected devices. The suspicious activity could be, for example, a user navigating through a bank's webpages faster than an actual person would, indicating that malware on the user's endpoint is performing the actions.
Users can defend against malware that can attack or bypass two-factor authentication systems by preventing it from infecting their endpoints with antimalware protection. Enterprises could require users that perform financial transactions make them from a secure endpoint or secure remote system. Enterprises could also use a network based antimalware device to block the command and control communications for the malware. The 2FA system could also require the user to re-authenticate periodically during a transaction. However, an updated version of the malware could adapt to capture any new tokens or codes generated by the reauthentication system, so financial institutions will need to remain vigilant.
Discover how Vawtrak malware blocks enterprise security software
Find out why the Carbanak banking malware attack caused nearly $1 billion in losses
Dig Deeper on Two-factor and multifactor authentication strategies
Related Q&A from Nick Lewis
Enterprises new to the cloud can write new security policies from scratch, but others with broad cloud usage may need an update. Consider these ... Continue Reading
Cloud security providers need to play catch-up with the evolving advancements in cloud technology. Find out what the top CSPs offer today and which ... Continue Reading
Cloud security certifications serve to bolster security professionals' resumes and boost value to employers. Learn about the top certifications ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.