How Are Cybercriminals Targeting Financial and Corporate Systems Today?

March 11, 2025
How Are Cybercriminals Targeting Financial and Corporate Systems Today?

Cybercriminals are constantly evolving their tactics to undermine financial and corporate systems. Recent discoveries by SOCRadar’s Dark Web Team reveal a range of sophisticated methods being employed to exploit vulnerabilities and exfiltrate valuable data. Understanding these methods is crucial for developing robust defenses against such persistent threats.

Emerging Threats and Tactics

Phishing and Bank Login Log Service

One of the primary methods employed by cybercriminals involves phishing campaigns designed to collect bank account credentials. Recently, a new log service has been detected, which provides access to bank account logins, emails, and session cookies. This data is then offered for sale on hacker forums, targeting financial institutions such as Barclays, Lloyds Bank, NatWest, HSBC, and Santander UK. The collected information enables cybercriminals to conduct various fraudulent financial activities, including unauthorized transactions and credit card top-ups.

Phishing techniques have grown increasingly sophisticated, making it challenging for users to differentiate between legitimate and fake communications. Cybercriminals craft convincing emails and websites that mirror those of genuine financial entities. The collected credentials are sold through encrypted messaging platforms, and payments are made exclusively in cryptocurrency. This ensures that transactions remain untraceable, thereby protecting the anonymity of threat actors. As individuals fall victim to these schemes, the breach of their financial data can lead to significant personal and economic losses.

Exploits and Vulnerability Targeting

In another alarming trend, cybercriminals are increasingly turning to zero-day exploits to compromise network devices. One such exploit currently targets TP-Link routers, enabling unauthorized remote access to the system. This specific Remote Code Execution (RCE) exploit allows attackers to infiltrate router systems, establish backdoors, disable firewall protections, and extract credentials. Cybercriminals can extend their reach beyond the router to other devices on the network, potentially compromising entire organizational infrastructures.

The sophisticated nature of such exploits is evident in the comprehensive support packages being sold alongside them, which make deployment accessible even to less technically skilled attackers. Prices for these exploits vary, with basic scripts going for $1,000 and full packages with detailed instructions and support priced at $2,000. The operational ease with which these exploits can be used underscores the escalating technical capability within the cybercriminal community. This development represents a significant risk to both corporate and personal network security, demanding constant vigilance and proactive defense measures.

Data Leaks and Corporate Vulnerabilities

Corporate Data Breaches

Corporate data breaches represent another major threat in today’s interconnected world. A recent example involves Wizz Air Holdings Plc., which experienced a substantial data leak affecting its various subsidiaries, including Wizz Air Hungary, Wizz Air Malta, Wizz Air Abu Dhabi, and Wizz Air UK. Over 5GB of sensitive corporate documents were exposed, containing critical operational, regulatory, and financial information. Such breaches expose companies to significant reputational and operational harm, as the data can be used for malicious purposes or sold to competitors.

The method through which this data was acquired remains undisclosed, emphasizing a troubling trend of undetected intrusions within corporate environments. Cybercriminals increasingly employ advanced techniques to infiltrate systems without immediate detection, often remaining hidden for extended periods while exfiltrating valuable information. The exposure of internal documents can disrupt operations and bring severe regulatory consequences, underscoring the urgent necessity for enhanced data protection and comprehensive security measures within corporations.

Financial Fraud Schemes

Another sophisticated method identified involves financial fraud schemes, such as the newly discovered D2C cash-out service. This service exploits various financial platforms, including Square, Chime, MoneyLion, and VARO, to facilitate unauthorized monetary withdrawals. By using pre-configured Point-of-Sale (POS) terminals, multiple merchant IDs, and proprietary payment gateways, cybercriminals can disguise fraudulent transactions as legitimate bank payments.

The threat actor behind this service claims to have executed over $1,000,000 in illicit transactions through Square, demonstrating the substantial financial gain achievable through such schemes. Virtual credit cards are used for payments, and communication is carried out via encrypted channels, maintaining the service’s anonymity and efficiency. The scale and sophistication of these fraud operations highlight the ongoing battle financial institutions face in securing payment systems and preventing unauthorized access to funds.

Conclusion

Cybercriminals are continually advancing their techniques to infiltrate financial and corporate systems. This evolution in cyber tactics poses a significant threat to data security and financial integrity. Recent research by SOCRadar’s Dark Web Team has shed light on a variety of sophisticated strategies being used by these criminals to identify and take advantage of system vulnerabilities. The hackers employ complex methods for stealing sensitive information and exploiting weak points within networks. It is of paramount importance that companies and security teams stay ahead of these threats by comprehending the latest tactics cybercriminals are using. By understanding their methods, organizations can develop stronger, more effective defenses to protect against such persistent and ever-evolving risks. Establishing robust cybersecurity measures and staying informed about the latest trends in cybercrime are essential steps in safeguarding valuable data from those with malicious intent.

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later