VB2014 preview: P0wned by a barcode


Fabio Assolini to speak about malware targeting boletos.


In the weeks running up to

VB2014

, we will look at some of the research that will be presented at the conference. In the first of this series, we look at the paper ‘

P0wned by a barcode: stealing money from offline users

‘, from Kaspersky researcher Fabio Assolini.

Cybercrime is a global phenomenon. In fact, it is its very global nature that makes it so hard to fight, as cybercriminals can easily hide behind proxies and legislations to stay out of the hands of law enforcement.

But this doesn’t mean that cybercrime doesn’t take local or regional forms. Those outside Brazil will probably not have heard of the ‘

Boleto bancáo

‘ (‘boleto’ for short), a very popular payment method in the Latin American country. Unsurprisingly, online crooks have discovered this too.

Boletos can be paid at ATMs, as well as at banks and in many shops. Each boleto is uniquely identified by a barcode printed on it – it is this barcode that makes sure the funds go to the intended recipient. This way, bills and even online shopping can be paid for without the need of a credit card or even a bank account.






Real boleto. The ID field can be manually entered in case the barcode cannot be scanned.

Of course, if you somehow ended up printing an incorrect barcode, the funds would go somewhere else – which is exactly what criminals have discovered. In his paper, Fabio looks at how malware is used to intercept and modify boletos as they are downloaded from the Internet. The barcode and its ID number are changed to point to an account owned or controlled by the criminals, and when the boleto is paid, the funds end up in their hands.

Other researchers have also recently looked at the underground economy’s interest in boletos. Last month, security firm

RSA


claimed

that through malware targeting boletos, crooks have netted the equivalent of billions of dollars in the past two years – though others have

disputed

that figure.






Boleto modified by malware: both the barcode and the ID field have been modified.

Malware targeting boletos continues to evolve. In a

post

on

Kaspersky

‘s

Securelist

blog, Fabio looks at the use of encrypted malware payloads XOR’ed with a 32-bit key and compressed using the ZLIB algorithm. This is a technique previously used by the GameOver Zeus botnet, and Fabio says he has evidence that Brazilian criminals are working together with European gangs.

To see a taster of Fabio’s presentation and to get an idea of the Brazilian online underground, here is the video Fabio’s VB2013

paper

on malicious PAC files.




You can now

register

for VB2014. And if you have some research that you want to share with the security community, why not

submit an abstract

to fill one of the seven remaining ‘last-minute’ presentation slots?

Posted on 13 August 2014 by

Martijn Grooten


Posted

in

by

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *