Flame 2.0: Gauss Malware Targets Banking Credentials

  /     /     /  
Publicated : 22/11/2024   Category : security


Flame 2.0: Gauss Malware Targets Banking Credentials


Stuxnet, Duqu, and Flame cousin has been used in targeted attacks, operating undetected for at least a year, primarily in Middle Eastern countries.



Malware watchers, meet Flame and Stuxnets cousin, known as Gauss, which is espionage software apparently commissioned by a nation state and first used as early as August 2011.
Heres whats known about Gauss: The surveillance malware has been designed to collect banking details, is apparently used only in highly targeted attacks, and has infected an inordinate number of PCs in Lebanon. Still, its exact purpose--including the potential motive that a nation state would have in stealing peoples banking credentials--so far remains a mystery.
In 140 chars or less, Gauss is a nation state sponsored banking Trojan which carries a warhead of unknown designation, according to an
analysis of Gauss
published by the global research and analysis team at Kaspersky Lab. Besides stealing various kinds of data from infected Windows machines, it also includes an unknown, encrypted payload which is activated on certain specific system configurations.
[ Keep your identity safe. See
8 Ways To Avoid Getting Your Life Hacked
. ]
There are clear links between the modules used by Gauss and Flame, which is related to
Stuxnet
, which in turn is related to
Duqu
. In other words, all four pieces of malware appear to have been commissioned--if not developed--by the same entity. Just like Duqu was based on the Tilded platform on which Stuxnet was developed, Gauss is based on the Flame platform, according to Kaspersky Lab. It shares some functionalities with Flame, such as the USB infection subroutines.
As with Flame, whoever controls Gauss can push various plug-ins to infected PCs. These plug-ins can do everything from relaying system configuration data and intercepted browser cookies and passwords to attackers, to stealing credentials used for Middle Eastern banks as well as social network login credentials. The modules have internal names which appear to pay tribute to famous mathematicians and philosophers, such as Kurt Godel, Johann Carl Friedrich Gauss, and Joseph-Louis Lagrange, according to Kaspersky Lab. The module named Gauss is the most important in the malware as it implements the data stealing capabilities and we have therefore named the malware toolkit by this most important component.
Kaspersky Lab said it discovered Gauss while continuing to participate in an effort commissioned by the
International Telecommunications Union
(ITU), which Kaspersky said is behind a program aimed at mitigating the risks posed by cyber-weapons, which is a key component in achieving the overall objective of global cyber-peace.
Interestingly, an ITU request to Kaspersky, earlier this year, to evaluate unknown malware that was found to be deleting sensitive information led to the
discovery of Flame
. Since then, Kaspersky has been analyzing other malware to see if it resembled Flame, and found glaring similarities in Gauss.
One feature of Stuxnet, Flame, and Gauss is that theyve tended to operate undetected for significant periods of time. Flame, for example, was
used in highly targeted attacks
since at least 2010, and perhaps as far back as 2007, before being discovered in June 2012. Flame is a prime example of why governments and industry must work together to tackle cybersecurity at the global level, said ITU secretary-general Hamadoun Toure in a statement, issued after Flame was discovered. Early warning of new threats is vital.
In the case of Gauss, the first known variant appeared in August 2011, which is interesting, since thats the month when Hungarys CrySyS Lab announced that it had discovered Duqu. Meanwhile, the most recent version of Gauss debuted in January 2012. Kaspersky said its logged only 2,500 Gauss infections since May 2012, though it estimates that the total number of infections will number in the tens of thousands. Finally, it said that the five
command-and-control servers
giving Gauss-infected PCs instructions and retrieving targeted data went dark in July 2012, though they could be restarted at any time.
Thanks to the developers forgetting to remove debugging information, Kaspersky noted some file designations with the name white, which it said
appears to refer to Lebanon
, the name of which comes from the Semitic root word that means white. On a related note, its seen the vast majority of Gauss infections in Lebanon, followed by Israel and Palestine. Meanwhile, a handful of infections have been traced to PCs in the United States, United Arab Emirates, Qatar, Jordan, Germany, and Egypt.

Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Flame 2.0: Gauss Malware Targets Banking Credentials