"High Roller" Hacker Attack is Stealing Hundreds of Millions From the Rich
June 26, 2012 3:13 PM
comment(s) - last by
Attack is an extension of the man-in-the-browser attack methodology
Security researchers admit they're still struggling to defeat man-in-the-browser (MitB) attacks. The best-known example of this attack is the Zeus (
, etc.) botnet, which is comprised of machines infected by drive-by-download or phishing attacks.
Researchers are currently only 23 percent effective at detecting and removing Zeus variants, although
attacks on command and control servers
have been somewhat effective. The malware operates via a browser extension in Firefox or via a Browser Helper Object in Microsoft Corp.'s (
) Internet Explorer. The Trojan is used to carry out traditional malware activities, such as spamming and bank transaction interception/modification.
I. Hackers Steal From the Rich, Give to Themselves With Op. High Roller
Now even as researchers continue to struggle with Zeus and
its successor SpyEye
, there's an even more sinister malware storm brewing that Guardian Analytics and Intel Corp. (
) subsidiary McAfee
have been tracking
[PDF], dubbed "Operation High Roller".
The new attack is much more organized, driven via cloud controllers, versus Zeus where infected machines often operated in a rogue lone manner.
Using cloud servers, machines infected with High Roller Trojans are hit with server-based fraudulent bank transactions totaling up to $130,000 USD (€100,000). These very large transactions are ferried through "mule" accounts also operated by the control-servers. The attacks use Zeus or SpyEye for reconnaissance and then use compromised local machines to target large accounts via
"spear phishing" tactics
An example "spear phishing" message from an infected machine. [Image Source: McAfee]
The new multi-approach malware is able to circumvent typical "chip and pin" physical security features, such as the smartcard reader ID systems commonly used in Europe. It targets primarily "high rollers" -- accounts with more than €250,000, the kind commonly maintained by wealthy individuals and corporations. This differs from Zeus and other past attacks that primarily targeted the masses with smaller transactions
Op. high roller is stealing millions from the wealthy [Image Source: The Hibernia Times]
II. Sophisticated Cloud-Commanded Malware Hits U.S.
The attacks initially targeted Europe, but have since spread to the U.S. and Columbia. The hardest hit region in Europe, according to McAfee is the Netherlands, which suffered over €141M ($175M USD). However attacks in the U.S. are also escalating with 8 to 10 malware variants currently attacking 109 businesses.
Texas is the state currently being hardest hit by the attacks. Numerous account holders in New York, Georgia, and California were also targeted.
Many states have been hit by Operation High Roller. [Image Source: McAfee]
Most of the attacks originated from command-and-control servers than Russia, though some C&C servers were also found in China and the U.S., among other places.
This article is over a month old, voting and posting comments is disabled
RE: phishing still works?
6/26/2012 11:42:47 PM
Precisely. Phishing and Trojans are the only sort of malware that can infect secure systems like Linux or OSX. These kinds of attacks depend on a naive user to execute the malicious code for them, or enter information on an illegitimate web site. It's nearly impossible to protect against such things, aside of educating the user.
RE: phishing still works?
6/27/2012 10:46:12 AM
Phishing and Trojans are the only sort of malware that can infect secure systems like Linux or OSX
You realize you just put LINUX and OSX in the same security category right?
Just had to say something about that. It's so wrong...
RE: phishing still works?
6/27/2012 2:43:09 PM
the only thing that makes linux secure is that its not in common use and you have to type your password in a hundred times a minute just to do anything.
p.s. i know that i exagerate
p.p.s i currently have a linux only household - and am very happy with it (mint13 at the moment).
“And I don't know why [Apple is] acting like it’s superior. I don't even get it. What are they trying to say?” -- Bill Gates on the Mac ads
Malware Focusing on Macs, Mobile Devices Increasing
May 24, 2012, 9:18 AM
Wrath of the Titans: Microsoft, U.S. Feds Slay Godly "Zeus" Botnets
March 26, 2012, 3:21 PM
China Appears to Have Committed "Unprecedented" Cyber-Attack on Canada
February 17, 2011, 10:32 AM
Kneber Botnet May Have Infected 75,000 PCs Globally
February 18, 2010, 10:44 AM
Thanks to Government Crackdown, Chinese "Porn Cop" Has Watched 600K Adult Videos
April 21, 2014, 12:00 PM
Record Labels Sue Pandora for Royalties on Songs Made Pre-1972
April 21, 2014, 9:13 AM
Google Knocked by Analysts, But Shows Strokes of Brilliance in Q1 2014
April 18, 2014, 2:33 PM
Google Street View and reCAPTCHA Get Smarter with New Algorithm
April 17, 2014, 9:02 AM
Mt. Gox CEO Refuses to Come to the U.S. in Financial Crimes Probe
April 16, 2014, 3:50 PM
Mark Zuckerberg: Facebook Home Reception Slower than Expected, Social Graph Will Pick Up
April 16, 2014, 2:00 PM
Most Popular Articles
A Bug's Life: Female Cave Bugs Have Penises, Penetrate Males for Three Days
April 17, 2014, 7:20 PM
Quick Note: Toyota Attempts to Erase “Boring” Image with ’15 Camry SE Hybrid
April 16, 2014, 11:36 AM
HTC Hires Former Samsung Marketing Chief Who Developed "Galaxy" Brand
April 18, 2014, 6:00 PM
Project Moonshine: Google's Plan to Flatten Android App Icons Leaks
April 16, 2014, 1:46 PM
Microsoft Announces the First Steps in Its "Universal Apps" Program
April 15, 2014, 7:59 PM
Latest Blog Posts
Facebook Aims to Provide Internet to "Every Person in the World" with Drones, Satellites
Apr 1, 2014, 10:20 AM
Retail Mobile Sites Experience Outages in Light of Simplexity's Bankruptcy
Mar 14, 2014, 8:48 AM
Tesla vs. BMW: Who Has the Safer EV?
Feb 1, 2014, 2:56 PM
Justice Leaks Details of Next HTC One Two Flagship Phone
Dec 5, 2013, 4:04 PM
Global Cyber Espionage Concerns Reveal Growing Cyber Armies
Nov 29, 2013, 11:04 AM
More Blog Posts
Copyright 2014 DailyTech LLC. -
Terms, Conditions & Privacy Information