30
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 30 Apr 2025
30 points (100.0% liked)
Australian News
698 readers
33 users here now
A place to share and discuss news relating to Australia and Australians.
Rules
- Follow the aussie.zone rules
- Keep discussions civil and respectful
- Exclude profanity from post titles
- Exclude excessive profanity from comments
- Satire is allowed, however post titles must be prefixed with
[satire]
Recommended and Related Communities
Be sure to check out and subscribe to our related communities on aussie.zone:
- Australia
- World News (from an Australian Perspective)
- Australian Politics
- Aussie Environment
- Ask an Australian
- AusFinance
- Pictures
- AusLegal
- Aussie Frugal Living
- Cars (Australia)
- Coffee
- Chat
- Aussie Zone Meta
- bapcsalesaustralia
- Food Australia
Plus other communities for sport and major cities.
https://aussie.zone/communities
Banner: ABC
founded 2 years ago
MODERATORS
Basically cyber security researchers monitoring the dark web have found credentials in dumps belonging to bank staff, this is concerning but doesn’t necessarily mean bank systems were directly compromised.
Staff members personal devices may have been compromised by infostealers not necessarily key loggers. Different malware but basically with the same end goal.
Or they could have been the result of a phishing campaign. There are a range of tactics, techniques and procedures (TTPs) for credential harvesting used by threat actors (hackers).
Typically initial access brokers obtain the credentials and sell them to other criminals and sometimes provide a small set for free so potential buyers can validate before they buy.
Speaking of TTPs that’s what is alluded to when they say initial access, which is a Tactic under the Mitre Attack framework.
https://attack.mitre.org/tactics/TA0001/
The banks response that there are systems in place to prevent use of these stolen credentials is more than just 2FA but also conditional access policies, active monitoring and cyber threat intelligence and response.
By the time this was published all identified accounts would have received forced password changes.
I have done cyber security consulting for one of the impacted banks, and I think the article is reasonably well researched but not as clear as I’d like for people unfamiliar with the topic.