Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Financial Fraud Botnet Discovered Operating On Victims In The UK

Trusteer : 04 August, 2010  (Technical Article)
Trusteer provides details of the Zeus version 2 botnet originating in Eastern Europe and targeting UK users in order to commit financial fraud
Financial Fraud Botnet Discovered Operating On Victims In The UK
Trusteer has uncovered a large Zeus version 2 Botnet being used to conduct financial fraud in the UK which is operated and controlled from Eastern Europe. The Botnet appears to be controlling more than 100,000 infected computers, 98% of which are UK Internet users. The criminals have been harvesting all manner of potentially lucrative and revenue-producing credentials - including online account IDs plus login information to banks, credit and debit card numbers, account types plus balances, bank statements, browser cookies, client side certificates, login information for email accounts and social networks and even FTP passwords. Trusteer discovered the extent of the Botnet after they gained access to the botnet's drop servers and command and control centre which contained the stolen information including hundreds of thousands of stolen credentials. Trusteer are sharing the information with UK law enforcement agencies.

"This is just one out of many Zeus 2 botnets operating all over the world," says Amit Klein, Trusteer's chief technology officer. "What is especially worrying is that this Botnet doesn't just stop at user IDs and passwords. By harvesting client side certificates and cookies, the cybercriminals can extract a lot of extra information on the user, that can be used to augment their illegal access to those users' online accounts."

'Coupled with the ability to remotely control users' machines, download data and run any file on them, this means that the fraudsters can insert partial or complete Internet pages into a live Web session, enabling to inject transactions at will or extract even more data from the hapless victims,' he added.

This is another example , he went on to say, of the growing trend of regional malware where the cybercriminals operate targeted and segmented attacks on users, harvesting revenue from one bank's users one day, and, as that bank's security systems ramp up, move on to another regional bank another day, in this case the UK has been targeted.

In short, says Klein, this is a fraudster's ultimate paradise, giving them hidden access to the users' online financial and allied activities, as surely as if they were sat at their shoulder watching their every keystroke, move and online action.

In addition to gaining access to the botnet's servers Trusteer has also been able to access the interface used by the fraudsters to manage the botnet. This allows a very unique view into the way fraudsters operate Zeus botnets. The interface allows three main functionalities. The first is the ability to monitor the growth and footprint of the Botnet with very accurate statistics and graphs showing the total number of bots, their distribution, newly added bots, count of active bots, etc.

The second is a search function on all traffic generated by the bots. The Botnet captures all HTTP and HTTPS traffic from infected computers and store it in a central MySQL database. A search tool allows the fraudsters to easily extract any type of information from the database. For example if the fraudsters are looking for credentials for a specific institution they can just type a part of the institution's URL into the search box and will immediately receive all HTTP/S requests that contain this pattern. From there they can extract the relevant login information. The third functionality allows criminals to push updates and other executables to specific bots or to the entire botnet. For example, they can push other pieces of malware or they can push a remote access programs that then allow them to remotely access the infected machine and control it.

Mickey Boodaei, Trusteer's CEO, says that the revelations surrounding the Zeus 2 Botnet are the result of hundreds of man hours of effort behind the scenes by his security team, who constantly monitor for this type of activity.

This effort is part of an ongoing intelligence operation Trusteer is running in order to investigate the various aspects of fraud. We try to learn as much as possible on any piece of malware that targets the banks we work with. This information allows the banks to better understand immediate threats and take various actions, many of which are behind the scene to protect their customers against these attacks.

'It's important to realise that, despite its size, this is just one of many Zeus botnets operating all over the world. Its size and controllable actions are a clear demonstration of the increasing sophistication of cybercriminal gangs and how they can harness the power of drive-by downloads, spam and general phishing trawls to create such a large swarm,' he said.

'Zeus has become one of the most prevalent Botnet trojans in the history of online bank fraud. Fighting financial malware requires banks to have accurate intelligence and strong fraud detection and mitigation capabilities. Fighting financial malware requires banks and their customers to work together. Internet users need to follow their bank's instructions and when asked download online banking security software such as from HSBC, NatWest, RBS and Santander which is specifically tuned to detect and resist specific threats that the bank identifies such as Zeus. Banks need to continue implementing multiple layers to detect, resist, and de-activate malware attacks and tightly integrate these layers together.
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo