The recent breach into JPMorgan Chase’s network — one of the biggest data breaches in history — may have been caused by malware, according to The Wall Street Journal. At this point, full details on the breach are still unavailable, but according to the article, published on Oct. 2:

“The attack appears to have been caused by malicious computer code, known as malware, people familiar with the matter have said. … Hackers appear to have originally breached J.P. Morgan’s network via an employee’s personal computer, a person close to the investigation has said. From there, the intruders were able to move further into the bank’s systems. Employees often use software to tap into corporate networks from home through what are known as virtual private networks.”

Unfortunately, possible malware involvement in the JPMorgan breach is not a surprising development. An IBM Trusteer-sponsored Ponemon study titled “The State of Advanced Persistent Threats” reveals that malware is the top method used in APT-related incidents. Ninety-three percent of the respondents say malware was the source of the attack.

Malware Use Grows Among Cybercriminals

The sophistication of new malware variants, coupled with continuously evolving evasion techniques, makes advanced malware a powerful tool. Over the last few years, new developments have enabled cyberattackers to silently infect user PCs with malware, using techniques like drive-by downloads, watering-hole attacks, malvertising and exploitation of vulnerabilities in other end-user applications. They enabled cyberattackers to silently grab information from compromised PCs. This information typically includes login credentials, Web-application data as well as data from emails and documents. In some cases, malware can even provide full remote control over the infected machine. Sophisticated evasion techniques ensure that the malware remains undetected and the breach progresses stealthily.

Employee PCs Used as Pivot Points into the Network

As for employee PCs, they continue to be an easy target. One reason is the users. Many employees use their PCs to access external websites, open email attachments and download documents and applications for work or personal reasons. Using sophisticated social-engineering schemes, cybercriminals manipulate these users to open weaponized or compromised content, which can silently download malware on employee PCs. User awareness programs have helped reduce risky behaviors of employees, making employees aware of the risk associated with accessing untrusted websites and opening untrusted files. Still, user awareness programs have not completely eliminated the risk of malware infections.

PC Protection Needed

The second reason is lack of effective protection on the PCs. Most employee PCs are still protected only with antivirus software, which cannot provide the defenses needed for preventing advanced malware infections on its own. Much has been written about this already. However, concerned with computer performance impact, organizations falter to add protections on employees PCs.

Until recently, organizations invested much more heavily in network protections rather than endpoint controls in order to protect against advanced threats. While network detection solutions can help reduce the number of malware infections, they do not eliminate malware infections completely. Evasion techniques added to advanced malware were specifically designed to bypass these detections, for example, by verifying that a real user PC has been reached before the malware starts executing. This is why it is important to add advanced malware protection on the employee endpoint.

External Access to the Corporate Network

Additionally, network controls are ineffective at protecting off-network and semi-managed employee endpoints. Today, many employees continue to work while outside of the corporate network, using their corporate-provided PCs or home computers. Surfing the Web on unprotected public Wi-Fi networks increases the risk of malware infections. If employees then use infected PCs to access corporate resources and sensitive business data, the cyberattacker can grab information that will allow network infiltration.

Today more than ever, it is critical to protect employee PCs against advanced malware with effective endpoint security tools. While this is especially critical for employee endpoints that are used for accessing sensitive systems and data, this is important for all employee endpoints. Once a machine that can access the network is compromised, it enables the launch of an attack from within the network. This enables the attacker to do a lot more than from the outside. By using a compromised system to launch attacks, the attacker has not only better access to systems and resources, but also more chances of remaining undetected.

More from Malware

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

12 min read - For the last year and a half, IBM X-Force has actively monitored the evolution of Hive0051’s malware capabilities. This Russian threat actor has accelerated its development efforts to support expanding operations since the onset of the Ukraine conflict. Recent analysis identified three key changes to capabilities: an improved multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and the use of fileless PowerShell variants of the Gamma malware. As of October 2023, IBM X-Force has also observed a significant increase in…

New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware

8 min read - IBM X-Force uncovered a new phishing campaign likely conducted by Hive0117 delivering the fileless malware DarkWatchman, directed at individuals associated with major energy, finance, transport, and software security industries based in Russia, Kazakhstan, Latvia, and Estonia. DarkWatchman malware is capable of keylogging, collecting system information, and deploying secondary payloads. Imitating official correspondence from the Russian government in phishing emails aligns with previous Hive0117 campaigns delivering DarkWatchman malware, and shows a possible significant effort to induce a sense of urgency as…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today