Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

Database Security

Prevent unauthorized access and exceed compliance requirements.

Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats
SpiderLabs Blog

Post-Soviet Bank Heists: A Hybrid Cybercrime Study

Today we are publishing a SpiderLabs Advanced Threat Report that details a major cyberattack targeting banks mainly located in post-Soviet states. All the attacks share a common profile and the finely tuned orchestration of the entire operation shows an innovative new technique for stealing money.

The strategy behind this attack was to manipulate the "Overdraft Limit" (OD), a critical attribute of debit cards. The overdraft limit specifies the amount of credit the owner can gain access to that is beyond their actual account balance. Not all debit cards offer OD as this depends upon the risk profile and other attributes of the account holder. The idea behind this attack worked like this:

  • Send people aka "mules" using rogue identities to branches to set up new bank accounts and request for debit cards
  • "Manipulate" the OD limit of these debit cards and remove any restrictions in the core card processing system/service
  • Transfer those recently acquired cards abroad
  • Involve other "mules" to withdraw funds from ATMs in large amounts

This hybrid attack combined both cyber and physical activities to steal money from the targeted banks. People or mules were used to open the bank account, the cyber team attacked the banking infrastructure and another team of mules was used to collect the money from ATMs located in foreign countries. The entire operation required many resources and careful coordination of these resources. Since legitimate debit cards (versus stolen cards) were used to perform the ATM transactions, and the attackers removed anti-fraud controls for those accounts, the cash-out did not trigger any alarms in the bank systems. The average attack duration was six months, including setting up new accounts, conducting the cyber-attack and withdrawing funds from ATM machines. An important feature to note is that in the final stage of the attack, manipulation of the debit cards OD limit and the withdrawals took place almost simultaneously. The same minute the first card OD limit was modified the physical card was used in another country to perform the withdrawal. Modifying a substantial number of cards required approximately 4-6 hours and at the same time all those cards were used abroad. This sophisticated coordination is a strong indicator of organized crime activities.

I want to emphasize one of the tools used after the last stage of the operation. When performing forensic investigations, you spend lot of time looking for remnants or evidence that will lead you to additional evidence and so on. This allows forensic investigators to build the sequence of events for the cybercrime along with its associated timeline. In this investigation, after we started analyzing the transactions we backtracked to identify one by one all the different systems compromised and used for malicious activities. You keep moving back until you hit one or more endpoints outside the bank's infrastructure which may then be used to detect adversaries. At one point we identified an internal system that had nothing to do with the card processing infrastructure but was leveraged for lateral movement and appeared to be the originating point of all the internal connections.

We immediately asked for a copy of this endpoint. The IT team agreed to provide a copy but cautioned us not to expect much as this system had become "unavailable" immediately after the attack. Nobody expected to see a connection between the attack and the failure of that system because there was no obvious correlation between them. When we received a copy of that system we discovered that the file system was corrupted and OS boot or file viewing was not possible.

OS not found!

After experimenting with several tools, it was clear that the MBR was corrupted or destroyed. At this point we used the tool TestDisk, a powerful open source data recovery software capable of fixing or recovering partition tables. Using TestDisk we were able to get the file system ready for further inspection. By correlating the timeline of events against the series of actions that led to the file system corruption we quickly identified a process called "dropper.exe" executed seconds before the last termination of the operating systems. This file was also deleted upon execution but was easily recovered.

Deeper investigation indicated the suspicious file was likely used to wipe evidence from the crime scene. This specialized malware "dropper.exe" was designed to render the OS unbootable. Upon execution, the malware corrupts the system's MBR, deletes itself and then executes an immediate system restart.

This executable drops a DLL file named "xuidll.dll" in the Windows System32 directory and adds a Winlogon registry key for persistence. The purpose of the dropped DLL is to wipe out the Master Boot Record (MBR) when a specific trigger condition is met.

This executable first drops a file xuidll.dll in the %windir%\System32 directory. This DLL exports two functions:

  1. install: This function is responsible for installing persistence on the target system using the following registry key.
  2. on_load: This function checks if specific conditions are met. These conditions include the existence of a certain key in the registry and that the date and time of November 25 10:30:00 am (or later) are met. When these conditions are met it wipes the system's MBR. It remains a mystery why such a condition was incorporated into the code.

The following code checks if the specific date and time condition is met:

Code to check whether MBR should be wiped (or not)

Code to wipe the system MBR

This file is not yet publicly known in VirusTotal or other similar services, which is another strong indicator of targeted operations and organized crime actors. The use of this tool demonstrates that the attackers were highly motivated to wipe their tracks clean by creating additional obstacles for investigative procedures.

Hashes of the file provided below:

Hash Type











Closing Thoughts

This set of attacks demonstrates that cyber criminals continue to innovate at an astonishing rate. In this case it was clearly demonstrated that criminal organizations can quickly identify weaknesses in processes such as new account creation and take advantage of them in a stealthy and efficient manner.

As soon as the attackers gained access to the infrastructure they performed network mapping and privilege escalation activities that allowed them to take on the role of a low privileged insider. Organizations need to expand their defensive security strategy to assume that they have "already been compromised" and actively search for threats to detect and minimize damage. This is known as Threat Hunting and helps businesses detect existing adversaries moving laterally within their infrastructures and mitigate these threats before they have a chance to realize their full potential.

Click here to read the full report.

Latest SpiderLabs Blogs

Search & Spoof: Abuse of Windows Search to Redirect to Malware

Trustwave SpiderLabs has detected a sophisticated malware campaign that leverages the Windows search functionality embedded in HTML code to deploy malware. We found the threat actors utilizing a...

Read More

The Sentinel’s Watch: Building a Security Reporting Framework

Imagine being on shift as the guard of a fortress. Your job is to identify threats as they approach the perimeter. The more methods you have for detecting those threats, the better your chances of...

Read More

Fake Advanced IP Scanner Installer Delivers Dangerous CobaltStrike Backdoor

During a recent client investigation, Trustwave SpiderLabs found a malicious version of the Advanced IP Scanner installer, which contained a backdoored DLL module. Our client had been searching for...

Read More