backtop


Print 19 comment(s) - last by Bubbacub.. on Jun 27 at 2:43 PM

Attack is an extension of the man-in-the-browser attack methodology

Security researchers admit they're still struggling to defeat man-in-the-browser (MitB) attacks.  The best-known example of this attack is the Zeus (aka Kneber, etc.) botnet, which is comprised of machines infected by drive-by-download or phishing attacks.  

Researchers are currently only 23 percent effective at detecting and removing Zeus variants, although attacks on command and control servers have been somewhat effective.  The malware operates via a browser extension in Firefox or via a Browser Helper Object in Microsoft Corp.'s (MSFT) Internet Explorer.  The Trojan is used to carry out traditional malware activities, such as spamming and bank transaction interception/modification.

I. Hackers Steal From the Rich, Give to Themselves With Op. High Roller

Now even as researchers continue to struggle with Zeus and its successor SpyEye, there's an even more sinister malware storm brewing that Guardian Analytics and Intel Corp. (INTC) subsidiary McAfee have been tracking [PDF], dubbed "Operation High Roller".

The new attack is much more organized, driven via cloud controllers, versus Zeus where infected machines often operated in a rogue lone manner.

Using cloud servers, machines infected with High Roller Trojans are hit with server-based fraudulent bank transactions totaling up to $130,000 USD (€100,000).  These very large transactions are ferried through "mule" accounts also operated by the control-servers.  The attacks use Zeus or SpyEye for reconnaissance and then use compromised local machines to target large accounts via "spear phishing" tactics.

Spear phishing email
An example "spear phishing" message from an infected machine. [Image Source: McAfee]

The new multi-approach malware is able to circumvent typical "chip and pin" physical security features, such as the smartcard reader ID systems commonly used in Europe.  It targets primarily "high rollers" -- accounts with more than €250,000, the kind commonly maintained by wealthy individuals and corporations.  This differs from Zeus and other past attacks that primarily targeted the masses with smaller transactions

Euros
Op. high roller is stealing millions from the wealthy [Image Source: The Hibernia Times]

II. Sophisticated Cloud-Commanded Malware Hits U.S.

The attacks initially targeted Europe, but have since spread to the U.S. and Columbia.  The hardest hit region in Europe, according to McAfee is the Netherlands, which suffered over €141M ($175M USD).  However attacks in the U.S. are also escalating with 8 to 10 malware variants currently attacking 109 businesses.

Texas is the state currently being hardest hit by the attacks.  Numerous account holders in New York, Georgia, and California were also targeted.  

High Roller attacks
Many states have been hit by Operation High Roller. [Image Source: McAfee]

Most of the attacks originated from command-and-control servers than Russia, though some C&C servers were also found in China and the U.S., among other places.

Source: McAfee



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

RE: phishing still works?
By impinchi on 6/27/2012 10:46:12 AM , Rating: 3
Phishing and Trojans are the only sort of malware that can infect secure systems like Linux or OSX

You realize you just put LINUX and OSX in the same security category right?

Just had to say something about that. It's so wrong...


RE: phishing still works?
By Bubbacub on 6/27/2012 2:43:09 PM , Rating: 3
the only thing that makes linux secure is that its not in common use and you have to type your password in a hundred times a minute just to do anything.

p.s. i know that i exagerate

p.p.s i currently have a linux only household - and am very happy with it (mint13 at the moment).


"We don't know how to make a $500 computer that's not a piece of junk." -- Apple CEO Steve Jobs














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki