Malware Tools Get Smarter To Nab Financial Data

  /     /     /  
Publicated : 22/11/2024   Category : security


Malware Tools Get Smarter To Nab Financial Data


New versions of the Gh0st RAT Trojan -- believed to be used by China -- and the Citadel cybercrime kit both advance the malicious state of the art.



Who Is Hacking U.S. Banks? 8 Facts (click image for larger view and for slideshow)
If youve got $3,931 burning a hole in your pocket, speak Russian, and want to invest in a crimeware toolkit, youre in luck.
Thats the price for the latest version of the Citadel malware, code-named Rain Edition (1.3.5.1), which includes all of the latest malware mod cons: advanced Firefox and Chrome data-stealing plug-ins, advanced
Web injection techniques
to modify code on targeted websites, and easier updating for Trojan files that have been used to infect PCs. The malware also sports an easy-to-use, browser-based interface for running the
command-and-control (C&C) infrastructure
that sends instructions to infected PCs in the botnet -- and retrieves stolen data -- as well as infection analytics.
Of course, thats assuming you could even obtain a copy of Citadel. Getting your hands on Citadel is more difficult because of a stricter validation process within the Russian underground, said Jerome Segura, a senior security researcher at Malwarebytes, in a
blog post
. The makers of Citadel are trying to keep a low enough profile to avoid gathering too much attention which could result in efforts to go after them -- as we have seen with Zeus. Accordingly, its only available on
selected Russian-language underground forums
.
[ Read
Windows 7 Malware Infection Rates Soar
. ]
As with much of the malware thats in circulation today, Citadel is designed to commit financial crimes. The main purpose of Citadel is to steal banking credentials, said Segura, noting that the malware includes built-in capabilities that allow attackers to search victims PCs for credentials related to specific banks. Most of the infected PCs, meanwhile, get managed by attackers using so-called bulletproof hosting providers. Predominantly located in Russia and China, these services will turn a blind eye to any cybercrime committed using their services, typically as long as it doesnt affect anyone inside their countrys borders.
Although financial malware and banking Trojans are in common use, another leading application for botnet-managed malicious code is for perpetrating
click fraud
, typically by using malware to generate fake advertising impressions. According to a
report on malware trends
released by Kindsight Security Labs, the most active botnet from July to September of this year was
ZeroAccess
, which is actively infecting an estimated 685,000 PCs in the United States, and 2.2 million worldwide.
Kindsight estimates that on a daily basis, ZeroAccess botnets alone generate about 140 million fraudulent ad-clicks and 260 terabytes of network traffic, costing advertisers $900,000 in lost advertising impressions per day. Of course, the malware can also be used to steal financial credential, sniff keystrokes and
steal BitCoins
.
Although malware remains the preferred tool for online criminals who want to steal financial details, recent advanced in espionage malware highlight its use for more political purposes as well.
For example, the most recent version of the Gh0st malware, which is designed to steal sensitive data, has lately added in a repurposed version of the Russian-built DarKDdoser tool, which can steal any passwords stored in the Mozilla Firefox browser, as well as launch three flavors of
distributed denial-of-service attacks
-- UDP floods, SYN floods, and HTTP floods -- according to a
blog post
from Vinay Pidathala, a security content researcher at FireEye.
The addition of DDoS capabilities is interesting, given that Gh0st previously has been used to
launch cyberespionage attacks
against targets in Iran, India, Germany, Thailand and other parts of Asia regions, in the pursuit of military, diplomatic, political and economic intelligence. Based in part on its use in an attack against the Dalai Lama and pro-Tibetan groups, security experts have suggested that many Gh0st attacks can be traced to China.
Gh0st is part of a class of Trojan application known as the
remote administration tool (RAT)
, which can be used to take complete control of an infected system, typically via an
advanced persistent threat
(APT) attack.
Although RATs have been used for years, they came to prominence last year after McAfee published details of a command-and-control website tied to a tool it dubbed Shady RAT. Alarmingly, the tool had been used for at least five years, to compromise at least 72 organizations, including 22 governmental agencies and contractors, over a period of five years. Based on the targets and techniques used, many security experts suspect that, as with Gh0st, the Chinese government was backing Shady RAT.
The continued updating of Gh0st, as well as banking Trojans such as Citadel, demonstrates that such software continues to remain highly effective at infecting targeted PCs, and obtaining data that offers economic or political upsides.
Faster networks are coming, but security and monitoring systems arent necessarily keeping up. Also in the new, all-digital
Data Security At Full Speed
special issue of InformationWeek: A look at what lawmakers around the world are doing to add to companies security worries. (Free registration required.)

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Malware Tools Get Smarter To Nab Financial Data