by June 1, 2010 0 comments

With over 24 million retail, corporate and NRI banking clients and a
comprehensive range of financial products and services offered online, ICICI has
identified the need to protect its customer base from the rapidly growing threat
of Drive by Downloads. The company implemented comprehensive security mechanisms
to ensure their online banking web applications were protected against hackers
seeking to inject malware. However, they also required monitoring controls to
ensure their clients were protected from injected malicious code that would
silently download and install malicious software. Key requirements of the bank
were as follows: monitor ICICI’s websites 24×7 for malicious code injection,
identify injected links redirecting web browsers to malicious websites, identify
active drive-by-downloads that automatically install malware on client
computers, alert ICICI personnel immediately upon malware injection. These
requirements were achieved by implementing cloud malware monitoring services.
ICICI Bank’s 24×7 Security Operation Center manages crawling, scanning and
reporting options through a custom cloud-based console. Upon malware injection,
the monitoring solution delivers SMS and email alerts with details including
malware type, source and malware target. As malware monitoring agents connect to
ICICI’s websites using standard browser sessions, there is no negative impact on
the websites being monitored.

  • Project Head: Tushar Vartak
  • Deployment Location: Mumbai
  • Team Size: 1
  • Tech Used: Virtual Sandboxing and behaviour based analysis
  • Expected life: 3 Years

Armorize Technologies

No Comments so far

Jump into a conversation

No Comments Yet!

You can be the one to start a conversation.