Kaspersky Labs, the digital security company, has reported that the technology used to attack Iran’s uranium production system (“Stuxnet”) has made its way into the banking system. The malware is hard to detect because it does not run from files – it exists only in memory, being passed from machine to machine over internal networks.
My comment is a meditation on the inevitability of this in exploitative corporate cultures.
Azethoth666 wrote:
>> Or perhaps its just taking them time to get around to everyone manually?
Considering the corporate culture of the American banking system, this seems highly likely. The post-mortem on the Wells Fargo account creation fraud was that management propagated unreasonable performance requirements, with the result that only fraudulent conduct by employees would produce the desire results. However, the executives, some of whom were ousted with huge bonuses, did not make the decision to commit fraud. They were protected from direct involvement by the decision made by employees fearing for their livelihoods.
That situation is ripe for exploitation by criminal elements, and in fact employees caught in that system would be likely to take a “Robin Hood” attitude to their compromise of corporate security.