[wordup] Friends don't let friends use internet explorer
Adam Shand
adam at shand.net
Tue Oct 27 17:24:11 EDT 2009
This is amazing and appears to be legit reporting. There's lots of
details missing in how it actually works but … it's the most
impressive piece of criminal hackery I've read about in a long time.
And to be fair, despite my snide subject line, it says that the below
attack doesn't rely on internet explorer.
Adam.
Source: http://www.wired.com/threatlevel/2009/09/rogue-bank-statements/
More: http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf
New Malware Re-Writes Online Bank Statements to Cover Fraud
New malware being used by cybercrooks does more than let hackers loot
a bank account; it hides evidence of a victim’s dwindling balance by
rewriting online bank statements on the fly, according to a new report.
The sophisticated hack uses a Trojan horse program installed on the
victim’s machine that alters html coding before it’s displayed in the
user’s browser, to either erase evidence of a money transfer
transaction entirely from a bank statement, or alter the amount of
money transfers and balances.
The ruse buys the crooks time before a victim discovers the fraud,
though won’t work if a victim uses an uninfected machine to check his
or her bank balance.
The novel technique was employed in August by a gang who targeted
customers of leading German banks and stole Euro 300,000 in three
weeks, according to Yuval Ben-Itzhak, chief technology officer of
computer security firm Finjan.
“The Trojan is hooked into your browser and dynamically modifies the
text in the html,” Ben-Itzhak says. “It’s a very sophisticated
technique.”
The information appears in a cybercrime intelligence report (.pdf)
written by Finjan’s Malicious Code Research Center.
The victims’ computers are infected with the Trojan, known as URLZone,
after visiting compromised legitimate web sites or rogue sites set up
by the hackers.
Once a victim is infected, the malware grabs the consumer’s log in
credentials to their bank account, then contacts a control center
hosted on a machine in Ukraine for further instructions. The control
center tells the Trojan how much money to wire transfer, and where to
send it. To avoid tripping a bank’s automated anti-fraud detectors,
the malware will withdraw random amounts, and check to make sure the
withdrawal doesn’t exceed the victim’s balance.
The money gets transferred to the legitimate accounts of unsuspecting
money mules who’ve been recruited online for work-at-home gigs, never
suspecting that the money they’re allowing to flow through their
account is being laundered. The mule transfers the money to the
crook’s chosen account. The cyber gang Finjan tracked used each mule
only twice, to avoid fraud pattern detection.
“They instruct the Trojan that the next time you log into your online
banking account, they actually modify and change the statement you see
there,” says Ben-Itzhak. “If you don’t know it, you won’t report it to
the bank so they have more time to cash out.”
The researchers were able to capture screen shots showing the rogue
bank statements in action, disguising, for example, a transfer of Euro
8,576.31 as Euro 53,94.
The researchers also found statistics in the command tool showing that
out of 90,000 visitors to the gang’s rogue and compromised websites,
6,400 were infected with the URLZone trojan. Most of the attacks
Finjan observed affected people using Internet Explorer browsers, but
Ben-Itzhak says other browsers are vulnerable too.
Finjan provided law enforcement officials with details about the
gang’s activities and says the hosting company for the Ukraine server
has since suspended the domain for the command and control center. But
Finjan estimates that a gang using the scheme unimpeded could rake in
about $7.3 million annually.
“The example we found relates to German banks,” Ben-Itzhak says. “But
we believe this will increase to other countries.”
More information about the wordup
mailing list