Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
ProSecurityZone Sponsor
 
 
News

Hackers Get Smarter With ZeuS Exploits

Imperva : 26 October, 2010  (Technical Article)
Imperva reports on the trends being taken by cyber criminals to diversify their methods and make the best use of the most successful hacking and phishing tools currently available
Reports that the world's most prolific phishing gang have diversified their operations over from conventional phishing emails to distributing the ZeuS Trojan is another sign that hackers are becoming incredibly sophisticated, says Imperva, the data security specialist.

More than anything, the attack vectors used by the Avalanche Botnet gang, who have taken two years to migrate to the new fraud architecture, indicate that criminal hackers are now using lateral thinking to develop their fraudulent modus operandi, says Amichai Shulman, Imperva's chief technology officer.

'What is apparent from our research is that the Avalanche cybercrime gang - who were reportedly responsible for two-thirds of the world's phishing attacks this time last year - are also using advanced programming techniques' he said.

The Imperva CTO continues, "The problem is that the banks, nor the users, are realizing that the client browser is actually under the control of the hacker. So although a user is in fact authenticated to the bank, all transactions are actually being performed from that moment on by the Trojan."

Imperva's research teams, he went on to say, concluded that using a man-in-the-browser attack, similarly to those uncovered in September, enables the electronic criminals to stage automated withdrawals. The problem of detecting this type of fraud is made all the more difficult as the banks are not aware that the initiator of the transaction is not the actual owner of the account but basically, an automated process,' he said.

'This is why some financial institutions, such as Sainsbury's Bank, now require users to confirm by mobile phone text message when a new account payee is set up,' he added.

'Until the banks are able to prevent against this type of complex malware-driven fraud, the cybercriminal gangs will continue to evolve their already sophisticated strategies to beat the banks - and their customers"
Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo