Driftnetting – the new threat vector

Phishing, spearphishing, whaling are all nautical terms that have been created or adopted by the information security industry. The AFP has coined a new term.

Driftnetting, according to the AFP’s Scott Mellis, is being employed by hackers intent on stealing funds by exploiting system vulnerabilities and normal business processes.

Here’s how it works.

Most people receive their salary either weekly or fortnightly. Often there’s an automatic process that processes employee salaries using data from the company HR system. Hackers rely on this regularity as it allows them to remain distant from the actual theft.

By exploiting some weakness in the HR system, stealing an employee’s credentials or hacking an account the adversary logs into the HR system. In order to escape detection, they’ll often do this during normal business hours so the log in looks like a normal activity.

Importantly, the bad actors also avoid doing this to HR staff who might notice their own accounts being accessed.

Once they log in to the employee’s account, they simply change the payment information to another bank account – often established by a mule who collects the money and then transfers it to the actual thief. Typically, several mules are used so there’s no single point of failure in the process if multiple accounts are accessed within one organisation or pay run.

Then the hacker sits back and waits for the normal weekly or fortnightly payroll process to run.

In other words, they use the falsified account information as a net to catch the money as it flows past through the normal tide of the payroll process.

For companies that fall victim to driftnetting, the first sign of detection is usually “employee rebellion” says Mellis. Once staff realise their regular pay hasn’t been deposited they call HR. By the time an investigation reveals what has happened the money is likely to have been moved from the mule accounts to the hackers.

Mellis describes these as “set and forget attacks” where the hacker makes the changes and waits for the natural process to perform.

A side effect of access to the HR system is that other personal information was accessed by the hackers. For example, they would have access to Tax File Numbers that was then used to submit false tax returns.

Mellis says “There was enough information extracted from these platforms for criminals to lodge a tax return. If they’d been successful it was likely they could submit a falsified return before the affected party realised”.

Fortunately, the ATO was able to detect these attempts but Mellis says there is an emerging trend in other jurisdictions around the world to lodge false tax returns as more and more systems go online.

Participate in this short survey on IT security strategies across the Australian market and go in the draw to WIN a 360Fly camera vailued at $689.

Start survey NOW

Join the CSO newsletter!

Error: Please check your email address.

Tags hackersattacksdriftnettingIT SecurityAFPtheftphishingpayrollHR systemswhalingtfnspear phishingATO

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Anthony Caruana

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place