New bank theft software hits three continents
LONDON: A new wave of automated hacking of online bank accounts might have stolen $78 million in the past year from customers in Europe, Latin America and the United States, according to researchers who peered into the computers of the hacking gangs.
The groups used recent improvements to two families of existing malicious software, known as Zeus and SpyEye, which lodged on the computers of clients at 60 banks.
While previous versions of the software have proved adept at stealing logon information, the latest variants automate the subsequent transfer of funds to accounts controlled by accomplices.
The findings, to be released on Tuesday by security firms McAfee and Guardian Analytics, confirmed and expanded on research from Japan-based Trend Micro Inc that was first reported last week by Reuters.
ÒThis looks like the beginning of a new technique,Ó said GuardianÕs Vice President Craig Priess, whose firm specializes in protecting banks.
The software is sophisticated enough to defeat Òchip and PINÓ and other two-factor authentication and to avoid transferring the entire contents of an account at one time, which can trigger review, according to the study. Trend Micro said it had seen the automated versions in action in Germany, the United Kingdom and Italy.
Guardian and Intel Corp-owned McAfee said the same technology, while still emerging, had been used by a dozen gangs against consumers and business clients of financial institutions in those countries and Colombia, the Netherlands, and the United States.
ÒSomeone designing this system has insider knowledge as to what the banks are looking for,Ó said Dave Marcus, research director at Mcafee Labs.
Server logs viewed by the researchers saw commands from the fraud rings to transfer a total of $78 million, including $130,000 from one account. The banks may have been able to block some of those transactions, the researchers acknowledged.
Though written and controlled by different groups, SpyEye and Zeus share the ability to be installed on computers that visit malicious websites or legitimate pages that have been compromised by hackers, as well as through tainted links in emails.
The programs already have used a technique called Òweb injectionÓ to generate new entry fields when victims log on to any number of banks or other sensitive websites. Instead of seeing a bank ask for an account number and password, for example, a victimized user sees requests for both of those and an ATM card number. All that information is sent to the hacker, who signs in and transfers money to an accompliceÕs account.
Those transfers can be time-consuming, and the hacker has to consider how much can be sent at once without drawing attention. Multiple, smaller transfers are preferable but take more time. For the past year or more, some variants have also captured one-time passwords, such as those sent from the banks by text messages to client cell phones as an added security measure.
Belum ada Komentar untuk "New bank theft software hits three continents"
Posting Komentar