Free Essay

Operation High Roller

In:

Submitted By amoss1098
Words 1345
Pages 6
Operation High Roller
Alejo Maciel II
March 25, 2015

Introduction
Operation High Roller (OHR) was a brazen cyber-attack discovered in January, and made public in July of 2012 by computer security firms McAfee and Guardian Analytics. OHR targeted high balance accounts of both individual consumer and business financial institutions, using a new extensive level of automation built on previously known Trojans Zeus and SpyEye. Although no person or group has ever been identified for the conspiracy and execution of the operation, the attackers were traced to servers performing these attacks in Russia, Albania, and China.
According to the McAfee/Guardian Analytics report “Dissecting Operation High Roller,” the firms first identified the group’s initial attack in Italy. Analyzing the attack and identifying the new tactics the group used to successfully target the Italian Bank, the firms found strong evidence of a replication attack against a German bank. It wasn’t until subsequent evidence of attack campaigns within Latin American and the United States were found that the global nature of these attacks was validated (Marcus & Sherstobitoff, 2012). Over an undisclosed time period an approximate amount of $78 million, with a potentially maxed attempt of $2 billion, was successfully siphoned during OHR (Quain, 2012).
Analysis
The group responsible for these attacks built their tactics on previously existing malware, custom malware, and an in-depth awareness of global banking transaction procedures. Their impact on information security set new precedencies in the use of automation during an attack; essentially removing any known manual transaction required from previously observed and documented uses of Zeus and SpyEye malware. Additionally, this attack has forced banking institutions to realize their vulnerabilities and begin assessing how mobile transactions will likely now be targeted as consumers migrate to user friendly mobile applications.
Zeus and SpyEye Evolve
Zeus and SpyEye are both part of the family of Trojan malware that primarily use the cracking technique of “man-in-the-browser” to steal sensitive banking information. The uniqueness of these Trojans when first released was their ability to bypass security mechanisms used by financial institutions such as SSL/PKI and the Two-Factor Physical Authentication protocols (Nahorney & Falliere, 2014). These Trojans where capable of capturing data used by banks to authenticate clients and facilitate strategies that attackers would execute to commit fraudulent transactions without the bank or client aware their money had been stolen until it was too late.
The evolution of the malware used during OHR evolved in parallel to the target. Prior to 2012, financial institutions believed using the Two-Factor Authentication methodology was sufficient to protect the integrity of financial exchanges; the strongest believed to be using a digital token created by two physical devices: a smartcard and smartcard reader. The malware discovered during OHR, was the first to bypass this security combination. Using an authentic simulation of when a token is created, the attackers were able to capture this token during a victims log in attempt and use the token during the transfer authorization process.
During McAfee/Guardian Analytics dissection of OHR, the companies identified 426 variants of Zeus and SpyEye malware used. A distinct difference found between the original versions of Zeus and SpyEye, and the malware used during OHR, was the amount of automation discovered in the code. Prior to OHR, Zeus and SpyEye still required a degree of manual components and active participation by the attacker; such as identifying a mule account the hacker uses to transfer the money to. During OHR, the strains of Trojans used, automated this traditionally manual step by searching for active mule accounts from a separate database. The automation in the code used was so extensive, depending on the client; the malware would perform the fraudulent transfers either from the client’s side during attacks against an individual, or from the attacker’s server if targeting a business. If targeting a business, all of the fraudulent activities were performed from the attacker’s server located at a “bullet proof” ISP and moved frequently to avoid blacklisting and reputation-centric software used by banks.
A Banking Industry Rocked
The news headlines around the world nearly all read “Bank hack: 'Operation High Roller' has netted $78M – so far” (Messmer, 2012). The global fraud ring became notorious following the release of the McAfee/Guardian Analytics report. The list of victims ranged from individual to business, European to Latin America and American, and to all manners of banking institutions: credit unions, regional banks, and large global banks. The most impacted victims were two banks in the Netherlands whose total sum of all transaction initiated to mules were over 35million euros (Messmer, 2012). The total sum of all compromised bank accounts during OHR was over 2billion dollars.
The report detailed the obvious for cybersecurity professionals; the security protocols financial institutions used were severely compromised. The confidentiality of the victims account information was compromised by phishing scams aimed at targeting individuals and businesses with accounts holding large sums of money. The integrity of financial exchanges was circumvented by gaining access to the information needed to successfully initiate fraudulent transfers; namely information to satisfy the Two-Factor Authentication requirements. The availability of the services provided by the bank was interrupted as the malware would purposefully stall the user from accessing their services and executing transfers during this interruption. Data would later be manipulated by altering banking statements to limiting functions to peripherals to prevent detection of any fraud.
What’s next? In a McAfee follow up report conducted by the security company, it predicted “Financial institutions, regulators, and security researchers should expect the likely next target to be Automated Clearing House payment channels. The fraudsters will build on the methods, malware, and infrastructure employed in Operation High Roller, laced with new ideas and locations to be discovered” (Sherstobitoff, 2012). Since OHR occurred, both the Zeus and SpyEye malware used for the foundation of the attacks have been publicly released. Zeus was believed to be leaked by its creator, an anonymous hacker now known to be Evgeniy Mikhailovich Bogachev, and SpyEye was released by a French security team known as RED Crew. The public release of these Trojans has already generated a new wave of malware that continues to build off of its foundation and attack new technologies used by financial institutions. Some of the new malware strains (e.g. Zitmo), now are capable of installing mobile malware on your smartphone, which enables criminals to steal one-time security codes, widely used by financial institutions for online transaction authentication.
Summary and Conclusions
In conclusion, OHR was a clear reminder, to both financial institutions and cybersecurity professionals that well-resourced fraud detection departments don’t necessarily equate to a guarantee of safety. OHR successfully attacked some of the world’s most respected financial institutions. In essence, they developed a virtual map to success based on automation, obfuscation, and creativity. However, looking towards the future, models used in industry cooperation against fraud have shown promise and progress. Examples include the work conducted by the originators of the report used for the basis of this paper, McAfee and Guardian Analytics. Through education and experience we can continue to develop our layers of security that can eventually become proactive in preventing the success of future attacks.

References
Marcus, D., & Sherstobitoff, R. (2012). Dissecting Operation High Roller. Santa Clara: McAfee, Inc. Retrieved from http://www.guardiananalytics.com/researchandresources/researchstudies_resources/Dissecting_Operation_High_Roller_Research_Report.pdf
Messmer, E. (2012, June 26). Bank hack: 'Operation High Roller' has netted $78M - so far. Retrieved from Network World: http://www.networkworld.com/article/2189619/malware-cybercrime/bank-hack---operationhigh-roller--has-netted--78m---so-far.html;
Nahorney, B., & Falliere, N. (2014, October 15). Trojan.Zbot. Retrieved from Symantec: http://www.symantec.com/security_response/writeup.jsp?docid=2010-011016-3514-99
Quain, J. R. (2012, June 26). Cyber bank robbers attempt billion-dollar heist, targeting your money. Retrieved from Fox News: http://www.foxnews.com/tech/2012/06/26/cyber-bank-robbers-attempt-billion-dollar-heist-targeting-your-money/
Sherstobitoff, R. (2012, October 23). Operation High Roller Revisited. Retrieved from McAfee Labs: https://blogs.mcafee.com/mcafee-labs/operation-high-roller-revisited

Similar Documents

Premium Essay

Operation High Roller

...Operation High Roller CSIA 301 November 23, 2014 New forms of cyber crime continue to come up all the time. Technology has aided the theft of money from bank accounts from banks from all over the world and one such cyber attack was Operation High Roller a cyber attack that targeted corporate bank accounts. According to The Wall Street Journal, these attacks which began in Europe spread to Latin America and even the United States (Booker 2012). The attackers did fraudulent transfer of money from accounts belonging to financial institutions. For instance, in the United States, the victims of the attack were companies whose commercial accounts had a minimum of several million dollars. The attackers sent SpyEye and Zeus software to hack computers that were infected with malware. This cyber attack has an extensive network and automation which interacts with serves that are used by their target victims. But much of the transactions are carried out in the servers used by the criminals. Two security firms, McAFee and Gurdian Analytic (Business Insider) were behind this discovery and they realized that there was no human participation required in the transactions. All the criminals needed were insider understanding of the goings on in the banking industry transaction systems. They then developed commercial and custom codes which they maliciously used to siphon millions of dollars into their virtual accounts. About sixty serves were identified as the ones used in making attempted...

Words: 1415 - Pages: 6

Free Essay

The Main Reason for the Flour Mill Noise

...or grains, with speed difference and relative rotation of the roller. When the material through a certain distance between the two rollers, the endosperm scraping from wheat skin, and ground into flour. The flour mill noise arising therefrom. In the quality of survival in the market competition, it is very important to reduce the noise. If the design of the flour mill body structure is unreasonable and the processing precision is not high, it will produce noise. When the two parallel rollers rotate in opposite directions, the rolling distance of general milling system is 0.1~0.8mm, the heart grinding system is 0.01~0.05mm. When the radial pulsation is relatively large, then the operation will not stable. Two grinding rollers are not flat, and grinding operation is not stable thus produce noise. The grinding roller is made up of both ends of the roll body is pressed into the shaft machining, the outer layer is chilled alloy cast iron with high hardness, the inner layer is gray. Roller body is longer, the two ends of the hole processing and the middle is not processed, due to the machining error of the roller and the material of the roller body is not uniform, the grinding roller is not balanced and the vibration is generated. The accuracy of the roller bearing is not high, and the design of the parts and the structure of the bearing is unreasonable, all these reason will cause bearing rotation accuracy is not high, short lived and noise increased. More information or any interests...

Words: 303 - Pages: 2

Premium Essay

Obvious Excellent Design About Wheat Roller Mill

...Win Tone wheat roller mill has huge power and capacity and they have excellent design. We have two models, with single couple grinding rollers model. To hold the volume of flowing product at a fix value, the feeding inlet was controlled automatically. So a regular operation and high quality product were obtained. With a wheat roller mill, the same raw grain, different operating management will be significantly different milling. Focus from the grinding process, the screen management processes, clear flour processes to explore, analyze the operation and management of the wheat milling process control and equipment. We are engaged in offering premium quality Fine Wheat with perfect homemade taste. The Fine WHEAT ROLLER MILL manufactured by our company is free from any artificiality and therefore helps in mental as well as physical growth of the family members. Good technology and equipment is a prerequisite for the right skills is to protect. Considered in the wheat flour, skilled control of the operating skills, and continuously explore and accumulate. Therefore, the operation of the section of processes must fulfill their duties, mutual collaboration, careful operation, only through the milling process to ensure that the bran flour to maximize the separation, in order to improve the wheat roller mill extraction rate, in order to achieve high quality, high yield and efficient best milling effect. To further the managements commitment toward quality one of our directors has...

Words: 288 - Pages: 2

Premium Essay

Essay On Railway Station

...static roller. Then the mechanical energy is stabilizedby gearbox and it is fed to the dynamo or generator, which converts the mechanical energy into electrical energy. Then the electrical energy is saved in the battery. The block diagram explains the overall view of the paper. Fig 2.1.1 Block diagram INNOVATION  Still now, there is no better way of recovering the wasteful electrical energy during regenerative braking. Here we have tapped some amount of energy and converted it into useful electrical energy.  We have proved that we can generate the electrical energy effectively in this method.  We are going to innovatively utilize the available constructional features and operation methodology of the Indian railways.  Key features in our paper  Construction of the train wheel  Construction of the rails  Foul mark point  Rail joints. ROTATIONAL ENERGY TRANSFER INTRODUCTION Rotational energy is the simplest form of energy, which can be converted into electrical energy. Most of the electrical energy is mainly generated from rotational energy. All the energy resources can be converted into electrical energy from rotational energy since the alternator used for electrical generation is the rotationalmachine except solar energy. When compared to other renewable resources like solar energy, fuel cell etc, the rotational energy has high efficient methods for producing electricity. ENERGY TRANSFORMATION Consider the two rollers, one...

Words: 1575 - Pages: 7

Premium Essay

Roller Function in Corn Grits Machine

...together. Therefore, we should keep regular maintenance of corn grits machine parts and ensure each part cooperates with each other perfectly.Roller is one of the main essential part of corn grits machine. Whether the CORN GRITS MACHINE runs well, roller maintenance matters a lot. We can maintain roller according to the following aspects: 1. Check whether the roller has serious bump or damage before operation. 2. The roller elasticity affects corn grits machine efficiency. So we need to check the roller elasticity by rotating the roller. Ensure the roller has no jam in working. 3. We should be careful in installing roller to avoid mutual friction of the parts. 4. We should count the installation diameter of the roller scientifically.In short, good performance of the roller and the corn processing machine depends on the correct operation and maintenance. We need to maintain the roller and the other parts of the machine regularly and make the machine keep normal running every day. YMSF-40 corn grits machine mainly consists of rack, grits making mechanism, screening and grading device, husk sucking device and motor drive. The grits making section adopts new designed water drop shape of grits making machine. It utilizes the high speed rotation of shearing type of blade. The peeled corn kernels gradually form into the mixture of corn grits and corn flour under the effect of the blade strike and cutting and screen friction and crash. The smashed material enters into cylinder...

Words: 380 - Pages: 2

Premium Essay

Wheat Roller Mill Produced by Win Tone Is Very Practical

...Wheat roller mill has been a core activity of the group since its founding in the 19th century. To this activity was added the roller milling business of Simon and Robinson in 1991. This brought to the group expertise in the milling of wheat for bakery products, durum for pasta semolina and maize (corn) for cornflakes, snacks and other human foods. Henan Win Tone Machinery manufacture Co., Ltd. is specialized in wheat processing equipment including wheat roller mill, animal feed machine and wheat silos. We have modern production workshop, advanced professional design, producing and installing group, scientific management mode, strict quality inspection to supply high quality complete sets of flour milling machines for wheat, corn/maize, rice, rye and barley, etc. Based on the advanced technology, good quality and reasonable price, we have very good reputation in the world market. The subsequent integration of these cereal milling areas of know-how has resulted in the development of several innovative process which are offered alongside more conventional solutions. In addition the company has expertise in the processing of rye, oats, barley and other cereals. Win Tone provides processing designs according to client’s different needs, creates new value for them and offers complete solutions for wheat processing machinery. We have professional after-sales service team to timely solve problems during operation, and provide complete after-sales service technology to eliminate...

Words: 307 - Pages: 2

Free Essay

Corn Flakes Machine Working Principle and Maintenance

...CORN FLAKES MACHINE is complicated and mechanical. One machine connects with another and restrain with each other. A small part will cause abnormal operation of the whole line. Hence, in daily life, the corn flakes machine must be seriously maintained. 1. After every shift, the workers should clean up the workshop and all the bins as well as settling chamber, wiping out the machine. 2. The complete set of corn flakes machine equipments must be in the charge of someone who add lubricant according to the following list. 3. When temperature of the roller increases and its scraping rate decreases, the grinding teeth are blunt. The roller needs drawing wire again. The diameter of the roller reduces, leading to increase of clearance between the two rollers so that you should adjust the center distance or change gear and roller. 4. Regularly clean the cloth deduster, keeping no clock and leakage. If it is blocked, put it under the sun or knock with canes instead of washing with water. 5. Clean dust in each equipment and and pipe, making the pipe unblocked. Repair the leakage. 6. Adjust tightness of conveying belt and change the damaged. If they are not used for a long time, loosen all the belts and keep ventilated and dry, preventing rust. 7. Check and maintain safety facilities, guaranteeing secure operation. 8. Check all the joints and sealed parts, repair if looseness and leakage happen. 9. Clean the vibrating sifter with brush. Knock and vibration are forbidden. Repair...

Words: 398 - Pages: 2

Premium Essay

A Study on Steel Production

...Limited (SAIL) pioneered the supply of wider cold rolled stainless steel coils and sheets in India. Phase-1 of the plant was commissioned in 1981 with French technical know-how. The capacity was augmented from the initial 32,000 tons of cold rolled stainless steel sheets and coils to 70000 tons per annum in 1991under Phase-2 expansion. A most modern stainless steel blanking line was installed in 1993 to produce coin blanks and utility blanks. The technical know-how foe the engineering process was done by the centre of engineering and technology (CET), the consultants of SAIL. The hot rolling facility commissioned in November 1995 has an installed capacity of more than 200000 tons of hot rolled flat products. The main four high steckel hot strips mill, four high reversing roughing mill and down coiler have been supplied by M/S SMS SCHLOEMANN SIEMAG, Germany. ITALIAMPIANTI, Italy have supplied the walking beam reheating furnace and M/S TOSHIBA, Japan have supplied the roll grinding machines. The main electronics are supplied by M/S Siemens, Germany. The hot strip mill, the mother unit of hot rolling facility is provided with hydraulic Gange setting and Automatic Gange Control (AGC). The continuously variable crown (CVC) which controls the profile flatness by the work roll shifting and bending ensures top notch quality hot rolled products meeting customer’s exact specifications. 55TPH WALKING BEAM REHEATING FURNACE: The furnace is a walking beam type, hydraulically...

Words: 2290 - Pages: 10

Premium Essay

Timken Company

...manufacturing and development experience. Because the two companies shared many of the same customers but had few products in common, customers would surely appreciate that Timken’s sales representatives could meet more of their needs. Timken’s potential annual cost savings from consolidating manufacturing facilities and processes were estimated to be more than $80 million. If the price paid for Torrington were too high, Ingersoll-Rand, rather than Timken, would capture the value of the synergies. In addition, given the large size of the acquisition, Timken was concerned about the impact on its balance sheet. If Ingersoll-Rand demanded a cash deal and if Timken raised the money with new debt, the increased leverage would almost certainly prompt credit agencies to downgrade Timken’s investment-grade rating. The Bearing Industry Bearings of various sizes and specifications found their way into everything from space shuttles to household appliances, automobiles, dentist drills, roller skates, and computer disk drives. In 2001, U.S. establishments involved in ball- and roller-bearing manufacturing employed more than 33,000 workers. The bearing industry was facing a variety of complex problems. Policies favoring the steel industry did not always consider the best interests of the bearing industry, which, as manufacturers of secondary steel products, was in the middle of the production chain. Because bearings were essential components of military and civilian machinery and equipment,...

Words: 4307 - Pages: 18

Free Essay

Lvs Strategy

...Executive Summary Las Vegas Sands is a hotel, gaming and resort development company which operates in many countries worldwide. It has 3 significant establishments; The Venetian and The Palazzo in United States, The Venetian Macao in Macau and Marina Bay Sands in Singapore. The company places strong focus on their code of conduct and ethical behavior of their employees. The company has both tangible and intangible resources. Their capabilities include excellent management of operations and human resources, specifically tailored offerings to the Asian market, the MICE business and Eco 360 cost savings initiative. We have identified their core competencies to be in MICE, the Eco 360 program, its Paiza Club which targets high end Asian clientele and the Venetian theme which is seen prominently in their establishments. We have also analyzed the company’s external environment based on Porter’s 5 forces. Most of the forces are identified to be moderate, with the exception of threat of substitutes being high. For this paper, we have defined their core business to be in the casino business. Their resort...

Words: 8702 - Pages: 35

Premium Essay

Safety Analysis of a High Voltage Test Lab

...Safety Analysis of a High Voltage Test Lab by David Wallace for ISE 6173 Instructor: Dr. Kari Babski-Reeves Spring 2015 ABSTRACT In the production of electrical transformers, dielectric test must be performed to certify the transformer will function properly in the field. These tests are conducted in a high voltage test lab (HVTL) where voltages can reach in excess of 500,000 volts. This health and safety assessment was performed on a HVTL to identify potential safety and health hazards within the lab and apply engineering controls, administrative controls and personal protective equipment to mitigate the hazard. This assessment was accomplished through the use of risk assessment, deviation analysis, job safety analysis, HAZOP and fault tree analysis following a five step method. Each hazard was quantified based on the consequence and the probability of occurring and classified based on the type of risk and the acceptance of the risk. From this analysis, the ten most critical hazards were chosen. These ten were then mitigated using the various controls listed above. * TABLE OF CONTENTS ABSTRACTii INTRODUCTION1 METHODS2 2.1 Safety and Health Analysis Tools2 2.1.1 Risk Assessment Analysis2 2.1.2 Deviation Analysis3 2.1.3 Job Safety Analysis5 2.1.4 Hazard and Operability Analysis5 2.1.5 Fault Tree Analysis6 2.2 Procedures for Five-Step Analysis6 2.2.1 Risk Assessment Analysis of Building and Facility7 2.2.2 Deviation Analysis of Hazardous Substances7 2.2.3 Job Safety Analysis...

Words: 5236 - Pages: 21

Premium Essay

The Main Use and Solution to Breakdown of Flour Milling Machine

...and other corns. Flour milling machine grind the wheat flour, maize, rice, millet and other corns with high flour yield, rich nutrition and delicate taste sweet and other characteristics. Low temperature and low speed grinding technology retains all the true grain nutrients, and eating will has the really long valley fragrance. In addition to these, flour milling machine also has many advantages. The flour milling machine covers a small area, has low noise, high efficiency, no wearing parts, and its body is beautiful and generous. It also has low investment, big market, huge profit and simple operation. Whenever we use any machinery or equipment, it is inevitable that the machine maybe broken down, so is the flour milling machine, in the course of its using, it will inevitably be due to some of the reasons causing some trouble. In the process of flour milling machine’s operation, the common problems may be the power less or no power, at this situation, the reason may be its screen is blocked, flour can not be screen out. The solution is very simple, only need to remove screen after the machine stop. If the flour milling machine can work normally, but its output is much less than before, this situation is mainly due to wear of gears is too big, or the gap between the roller. For this reason, we can press the spring to ensure that gap between the two sides of rollers, or...

Words: 259 - Pages: 2

Premium Essay

Effective Maintenance

...Proceedings of the 2012 International Conference on Industrial Engineering and Operations Management Istanbul, Turkey, July 3 – 6, 2012 Effective Preventive Maintenance Scheduling: A Case Study Hasnida Ab-Samat, Livendran Nair Jeikumar, Ernnie Illyani Basri, Nurul Aida Harun and Shahrul Kamaruddin School of Mechanical Engineering Universiti Sains Malaysia Engineering Campus, 14300 Nibong Tebal, Penang, Malaysia Abstract Maintenance is an important system in operation. In an era where industries are focusing on 24 hours operation to maximize production, machines are pushed to its absolute limits to cope with this demand. As utilization increases, the rate at which the machine parts get worn out increases thus the frequency of failure increases rapidly. To combat this problem and ensure that machines continue to operate at its optimum, maintenance work is carried out. One of the branches of maintenance technique which is carried out to prevent occurrences of failure before it happen is known as Preventive Maintenance (PM). However, performing PM may not be as easy as it requires great cooperation from the maintenance, production and management departments. This paper is written to study the aspects of effective PM and to analyze the causes of inefficient PM activity in a case study company and its implications. Another important approach taken is to investigate the causes of machine downtime by performing a root cause analysis. Affinity diagram was formed to highlight...

Words: 4634 - Pages: 19

Premium Essay

Corporate International Finance Ch.2 Case Studies

...inflation in Thailand affect Blades(assume U.S. inflation remains constant)? ANSWER: A high level of inflation in Thailand relative to the United States could affect Blades favorably. Generally, if a country’s inflation rate increases relative to the countries with which it trades, consumers and corporations within the country will most likely purchase more goods overseas, as local goods become more expensive. Consequently, Blades’ sales to Thailand may increase. 2. How could competition from firms in Thailand and from U .S. Firms conducting business in Thailand affect Blades? ANSWER: Blades would be favorably affected relative to Thai roller blade manufacturers and relative to other U.S. roller blade manufacturers with operations in Thailand. Both groups of firms will likely be forced to raise their prices if they want to maintain the same profit margin should inflation in Thailand increase. This is especially true if both groups of firms source their supplies directly from Thailand, so that the prices of these supplies are subject to the higher inflation is Thailand. Conversely, Blades’ cost of goods sold incurred in Thai and is relatively small . Consequently, costs will not be subject to the higher level of inflation in Thailand to a great extent and Blades will probably not have to raise its prices to the same extent as Thai roller blade manufacturers or U.S. manufacturers with operations in Thailand 6. How could a decreasing level of national income in Thailand affect...

Words: 941 - Pages: 4

Free Essay

Paint Factory Workings

...A paint is composed of pigments, solvents, resins, and various additives. The pigments give the paint color; solvents make it easier to apply; resins help it dry; and additives serve as everything from fillers to antifungicidal agents. Hundreds of different pigments, both natural and synthetic, exist. The basic white pigment is titanium dioxide, selected for its excellent concealing properties, and black pigment is commonly made from carbon black. Other pigments used to make paint include iron oxide and cadmium sulfide for reds, metallic salts for yellows and oranges, and iron blue and chrome yellows for blues and greens. Solvents are various low viscosity, volatile liquids. They include petroleum mineral spirits and aromatic solvents such as benzol, alcohols, esters, ketones, and acetone. The natural resins most commonly used are lin-seed, coconut, and soybean oil, while alkyds, acrylics, epoxies, and polyurethanes number among the most popular synthetic resins. Additives serve many purposes. Some, like calcium carbonate and aluminum silicate, are simply fillers that give the paint body and substance without changing its properties. Other additives produce certain desired characteristics in paint, such as the thixotropic agents that give paint its smooth texture, driers, anti-settling agents, anti-skinning agents, defoamers, and a host of others that enable paint to cover well and last long. Manufacturing process The manufacturing process involves five critical parts: Accurate...

Words: 1486 - Pages: 6