NukeBot: New Ready-to-Attack Version of Dangerous Banking Trojan Caught in the Wild - www.hardwarezone.com.my

HWZ Forums

Login Register FAQ Mark Forums Read
HWM Malaysia on Facebook

NukeBot: New Ready-to-Attack Version of Dangerous Banking Trojan Caught in the Wild

Reply
 
Thread Tools
Old 06-09-2017, 10:07 AM   #1
SoftwareSystemUpdate
Junior Member
 
Join Date: Jun 2017
Posts: 22
NukeBot: New Ready-to-Attack Version of Dangerous Banking Trojan Caught in the Wild

Kaspersky Lab researchers have detected NukeBot – new malware which has been designed to steal the credentials of online banking customers. Earlier versions of the Trojan were known to the security industry as TinyNuke, but lacked the features necessary to launch attacks. The latest versions however, are fully operable, and contain code to target the users of specific banks.

Although the appearance of a malware family in the wild is not unusual, the fact that criminals have a ready-to-attack version of the Trojan, means that soon they may initiate a wide-scale malicious campaign, to infect multiple users. As an early warning to its customers and other users, Kaspersky Lab has published a brief analysis of the malware.

NukeBot is a banking Trojan. Upon infection it “injects” malicious code into the webpage of an online banking service displayed in a victim’s browser and then steals user data, spoofs their credentials, and more. According to Kaspersky Lab researchers, there are already a number of compiled samples of this Trojan in the wild – shared on underground hacking forums. Most of these are rough, barely operational malware drafts; however, the company’s experts have managed to identify some that pose a real threat.

Around 5% of all samples found by Kaspersky Lab were NukeBot’s new ‘combat versions’, which have improved source codes and attacking capacities. Among other things these versions contain injections – specific pieces of code, which mimic parts of user interface of real online banking services. Based on the analysis of injections, Kaspersky Lab experts believe the main targets of the new version of NukeBot are users of several French and US banks.

In addition, Kaspersky Lab researchers managed to detect several NukeBot modifications that didn’t have web injection functionality, and were designed to steal mail client and browser passwords. This means that developers of new versions may aim to widen the functionality of this malware family.

“While criminals behind recent versions of this malware currently are not actively distributing NukeBot, this may, and likely will, change very soon. We’ve already seen this before with some other malware families: after a short testing period of a ready-to-attack malware, criminals start distributing it widely through infected websites, spam and phishing. So far we have seen NukeBot versions which are ready to attack the customers of at least six banks located in France and the US, however this list of targets looks like only the beginning. The goal of our brief research is to warn the banking community and online banking customers about a potentially emerging threat. We urge interested parties to use the results of our research in order to protect themselves from this threat in advance,” said Sergey Yunakovsky, security expert at Kaspersky Lab.

To protect yourself and your customers from NukeBot attacks, Kaspersky Lab security specialists offer the following advice:

For financial organizations providing online banking services:
• Make sure you have an effective fraud prevention solution in place, so that you can quickly and accurately spot unauthorized use of customer accounts and irregular financial activity.

For customers of online banking services:

• Use an Internet security solution with tailored technologies to protect financial transactions, like Kaspersky Lab’s Safe Money
• Regularly run a system scan to check for possible infections.

Kaspersky Lab products detect the malware as Trojan-Banker.Win32.TinyNuke.

To learn more about the ‘combat versions’ of NukeBot, read the blog post, available on Securelist.com.

Source:http://www.businessmirror.com.ph/kas...ebot-versions/
SoftwareSystemUpdate is offline   Reply With Quote
Reply


Thread Tools

Posting Rules

Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump