Security Firms Warns Online Bankers

Share This Post

Financial malware authors are trying to evade new online banking security systems by returning to more traditional phishing-like credential stealing techniques, according to researchers from security firm Trusteer. Most financial Trojan programs used by cybercriminals today are capable of tampering in real time with online banking sessions initiated by victims on their computers. This includes the ability to execute fraudulent transactions in the background and hide them from the user by modifying the account balance and transaction history display in their browser. As a result, banks have started deploying systems to monitor how customers interact with their websites and detect anomalies that might indicate malware activity. However, it seems that some malware creators are returning to more traditional techniques that involve stealing credentials and using them from a different computer in order to avoid being detected.

Familiar Trojans, new technique

Trusteer researchers have recently detected changes in the Tinba and Tilon financial Trojan programs designed to prevent victims from accessing the real online banking websites and replace their log-in pages with rogue versions.

trojan

“When the customer accesses the bank’s website, the malware presents a completely fake web page that looks like the bank login page,” Trusteer’s chief technology officer Amit Klein said Thursday in a blog post. “Once the customer enters their login credentials into the fake page the malware presents an error message claiming that the online banking service is currently unavailable. In the meantime, the malware sends the stolen login credentials to the fraudster who then uses a completely different machine to log into the bank as the customer and executes fraudulent transactions.” If the bank uses multi-factor authentication that requires one-time passwords (OTPs), the malware asks for this information on the fake page as well. This type of credential theft is similar to traditional phishing attacks, but it is harder to detect because the URL in the browser’s address bar is that of the real website and not a fake one. “It’s not as sophisticated as injecting transactions into web banking sessions in real time, but it accomplishes its goal of evading detection,” Klein said. This “full page replacement” feature is present in Tinba version 2, which Trusteer researchers have recently discovered and analyzed. The malware comes with support for Google Chrome and attempts to limit its network traffic by storing images loaded on the fake page locally.

Already in use

According to the Trusteer researchers, Tinba v2 is already used in attacks targeting major financial institutions and consumer Web services. “Banks have always faced two attack vectors in the online channel,” Klein said. “The first is credentials theft. There are various ways to execute this type of attack including malware, pharming and phishing. The second attack vector is session hijacking which is achieved through malware. These two vectors require two different solutions.” Banks should make sure that they have protection in place against both attack types, otherwise cybercriminals will quickly adapt their techniques, Klein said. “You can’t put a lock on your door and leave the window open.”  

Stay Ahead: Join the EwtNet Insider Email Club!

Stay informed and up-to-date with EwtNet's email subscription. Join our exclusive community and receive curated news, updates, and insights tailored to your interests.

Related Posts

NSA has a spying program that targets many mobile networks

  The NSA has recently conducted a campaign focused...

The Arrival Of Firefox 14 Beta with an Extra Shot of Security

Mozilla's new Firefox 13 browser may have just barely...

Best Tools For Ethical Hacking

To the uninformed, ethical hacking is a criminal practice...

Lock and Protect your Computer with a Secret Key

With so many cracking tools coming up to break...

A Look at the Worst Security Snafus of 2012 So Far!

Could things really be this bad? From the embarrassing...

Protect your devices from Web and email threats

Smartphones and tablets are vulnerable to attack, too. Here's...
- Advertisement -

Discover more from EwtNet

Subscribe now to keep reading and get access to the full archive.

Continue reading