As a response to this threat, Visa has published a security alert for Issuers, Acquirers, Processors, and Merchants warning of the malware’s recent spread (primarily in South America) and targeting of credit card Track 2 data (which is the sensitive data that comes from a credit card’s magnetic stripe). The malware has successfully compromised and exfiltrated card data already.
The initial infection vector is usually spear phishing attacks, where victims are enticed to enable malicious macros in Microsoft Word documents that are sent as email attachments.
Visa’s security alert included some advice to protect against spear phishing:
In addition to their advice, it would be prudent to review and understand additional controls around the execution of Microsoft Word macros. Microsoft has some advice for Office 2016 here.
While some of this advice is focused on the Floki Bot threat, much of it is just part of what we at Online see as an effective information security program. For assistance building your defenses against Floki Bot (or the next Floki Bot-like threat!) ask us about our Gap Analysis and Compliance Roadmap review of your environment.
Learn more about Online Business Systems’ Risk, Security and Privacy practice by clicking here.
For more information:
Arbor Networks has published an observed description of the compromise.
Arbor Networks has published a list of IOC (indicators of compromise) for Floki Bot.
In October 2016, Vitali Kremez of Flashpoint published a great summary of Floki Bot.
[1] https://en.wikipedia.org/wiki/Zeus_(malware)