Categories: SecuritySoftware

Banking Trojan Exposed By Researchers

Researchers at Finjan are shining a light on a sneaky banking Trojan behind the theft of roughly $439,000 (300,000 euros) from German bank accounts over a 22-day period.

Dubbed URLZone, the Trojan served as a digital lock pick for a sophisticated cyber-gang Finjan tracked from 11 Aug to 1 Sept. Unlike many typical banking Trojans, URLZone goes beyond tricking victims into coughing up their banking credentials by inserting text boxes into online banking applications. It calls back to its C&C (command and control) server for instructions on how much money to steal without causing suspicion at the bank, and to which money mule account to send the money

The URLZone Trojan also alters the victim’s on-screen bank account statements in an effort to cover its tracks.

“In this case, the specific criteria that the Trojan received from its command and control center mark a whole new level of cyber-crime sophistication in the techniques used by cyber-criminals,” Yuval Ben-Itzhak, CTO of Finjan, said in a statement Sept. 30. “Using these methods they successfully evade anti-fraud systems that banks deploy—we dubbed it the ‘anti-anti-fraud.'”

The cyber-gang used the well-known LuckySpoilt crimeware tool kit to exploit victims’ browsers and install the Trojan on their PCs. The gang did this via both malicious and compromised Websites, ultimately attracting roughly 96,000 visitors. Of those, researchers found that 6,400 were infected. Once URLZone is on a system, it logs credentials and activities of bank accounts, steals money from the compromised accounts and hides its activity in the report screen of the compromised account in real time.

“To avoid warning signs by anti-fraud systems at the bank, the money mule accounts are only used … a limited number of times within a certain time frame,” said the Finjan statement. “Since banks monitor large bank transfers, the amount of money deposited in a money mule account is predefined in order to stay under the radar.”

Communication between the Trojan and the C&C server was conducted over HTTP, with the data being XOR-encrypted. Law enforcement took down the servers after being notified of the scam by Finjan, but the Trojan tool kits remain in circulation in the cyber-underground.

“To avoid detection, cyber-criminals continue to improve their methodologies for stealing money and going under the radar from the victims and banks alike,” Ben-Itzhak said. “With the combination of using sophisticated Trojans for the theft and money mules to transfer stolen money to their accounts, they minimize their chances of being detected.”

Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Share
Published by
Brian Prince eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved

Recent Posts

OpenAI Hit By Austrian Complaint Over ChatGPT ‘False Data’

Rights group argues ChatGPT tendency to generate false information on individuals violates GDPR data protection…

2 hours ago

EU Designates Apple’s iPad OS As DMA ‘Gatekeeper’

European Commission says Apple's iPadOS is 'gatekeeper' due to large number of businesses 'locked in'…

3 hours ago

Beating the Barbarians in the Cloud

As the cloud continues to be an essential asset for all businesses, developing and maintaining…

3 hours ago

Austria Conference Calls For Controls On ‘Killer Robots’

Internatinal conference in Vienna calls for controls on AI-powered autonomous weapons to ensure humans remain…

3 hours ago

Taiwanese Chip Giant Exits China Mainland

Major Taiwan chip assembly and test firm KYEC to sell Jiangsu subsidiary, exit mainland China…

4 hours ago

Deepfakes: More Than Skin Deep Security

As deepfake technology continues to blur the lines between reality and deception, businesses and individuals…

4 hours ago