backtop


Print 19 comment(s) - last by Bubbacub.. on Jun 27 at 2:43 PM

Attack is an extension of the man-in-the-browser attack methodology

Security researchers admit they're still struggling to defeat man-in-the-browser (MitB) attacks.  The best-known example of this attack is the Zeus (aka Kneber, etc.) botnet, which is comprised of machines infected by drive-by-download or phishing attacks.  

Researchers are currently only 23 percent effective at detecting and removing Zeus variants, although attacks on command and control servers have been somewhat effective.  The malware operates via a browser extension in Firefox or via a Browser Helper Object in Microsoft Corp.'s (MSFT) Internet Explorer.  The Trojan is used to carry out traditional malware activities, such as spamming and bank transaction interception/modification.

I. Hackers Steal From the Rich, Give to Themselves With Op. High Roller

Now even as researchers continue to struggle with Zeus and its successor SpyEye, there's an even more sinister malware storm brewing that Guardian Analytics and Intel Corp. (INTC) subsidiary McAfee have been tracking [PDF], dubbed "Operation High Roller".

The new attack is much more organized, driven via cloud controllers, versus Zeus where infected machines often operated in a rogue lone manner.

Using cloud servers, machines infected with High Roller Trojans are hit with server-based fraudulent bank transactions totaling up to $130,000 USD (€100,000).  These very large transactions are ferried through "mule" accounts also operated by the control-servers.  The attacks use Zeus or SpyEye for reconnaissance and then use compromised local machines to target large accounts via "spear phishing" tactics.

Spear phishing email
An example "spear phishing" message from an infected machine. [Image Source: McAfee]

The new multi-approach malware is able to circumvent typical "chip and pin" physical security features, such as the smartcard reader ID systems commonly used in Europe.  It targets primarily "high rollers" -- accounts with more than €250,000, the kind commonly maintained by wealthy individuals and corporations.  This differs from Zeus and other past attacks that primarily targeted the masses with smaller transactions

Euros
Op. high roller is stealing millions from the wealthy [Image Source: The Hibernia Times]

II. Sophisticated Cloud-Commanded Malware Hits U.S.

The attacks initially targeted Europe, but have since spread to the U.S. and Columbia.  The hardest hit region in Europe, according to McAfee is the Netherlands, which suffered over €141M ($175M USD).  However attacks in the U.S. are also escalating with 8 to 10 malware variants currently attacking 109 businesses.

Texas is the state currently being hardest hit by the attacks.  Numerous account holders in New York, Georgia, and California were also targeted.  

High Roller attacks
Many states have been hit by Operation High Roller. [Image Source: McAfee]

Most of the attacks originated from command-and-control servers than Russia, though some C&C servers were also found in China and the U.S., among other places.

Source: McAfee



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: phishing still works?
By MadMan007 on 6/26/2012 5:00:38 PM , Rating: 1
Thanks jerk. I was trying to come up with a way of wording that to convey my thoughts but couldn't come up with the right wording and wasn't going to take forever doing it.

I *acknowledge* that there are stupid people, even after many years of warnings about such things, what surpises me is that it works *so well* Maybe it's just a numbers thing, I'd be interested to know what percentage of people who receive spam like this are actually victimized.


RE: phishing still works?
By MadMan007 on 6/26/2012 5:33:58 PM , Rating: 4
Sorry for the 'jerk' comment...I just thought that what I said made sense, and figured more people wouldn't be quite as cynical (which I usually am) about how many people fall for this kind of thing.


"Vista runs on Atom ... It's just no one uses it". -- Intel CEO Paul Otellini














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki