Phishing danger increases as Storm botnet is hired out


Smart new trojan and Storm diversification add to online banking risk.

The dangers of banking online grew significantly in past weeks, as portions of the ever-expanding Storm botnet were hired out to run phishing campaigns and a sophisticated new trojan was discovered, capable of targeting 400 different online banking systems around the world.

With the network of systems compromised by the Storm attack having doubled over the Christmas period, according to reports from

Spamhaus

(details and comment at

OneStopClick.net


here

), portions of the vast botnet have been put to use operating phishing sites targeting UK banks including

Halifax

and

Barclays

.

With segments of the network first seen

rented out for spamming purposes

in October last year, the latest development presents further evidence of the network’s size and stealthy structure being put to use for fraud and financial gain.

An even more worrying trend is the emergence of a highly sophisticated new trojan targeting a wide range of banks. The trojan’s man-in-the-middle capability allows attackers to bypass two-factor authentication by inserting themselves between the user and the bank.

The attack, dubbed ‘SilentBanker’ by

Symantec

, recognises and targets online banking sites operated by 400 different banks from many countries. Configuration data is updated frequently, multiple browsers are handled, and banking requests can apparently be redirected silently via a malicious server, enabling transactions to be rerouted to accounts of the attackers’ choice. The enhanced functionality only targets certain banks, with most hit using more standard fake login pages to steal bank access information.

More details of the Storm phishing campaigns are at

F-Secure


here

and at

ESET


here

. Further information on the ‘SilentBanker’ trojan is at

Symantec


here

.

Posted on 15 January 2008 by

Virus Bulletin


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *