backtop


Print 19 comment(s) - last by Bubbacub.. on Jun 27 at 2:43 PM

Attack is an extension of the man-in-the-browser attack methodology

Security researchers admit they're still struggling to defeat man-in-the-browser (MitB) attacks.  The best-known example of this attack is the Zeus (aka Kneber, etc.) botnet, which is comprised of machines infected by drive-by-download or phishing attacks.  

Researchers are currently only 23 percent effective at detecting and removing Zeus variants, although attacks on command and control servers have been somewhat effective.  The malware operates via a browser extension in Firefox or via a Browser Helper Object in Microsoft Corp.'s (MSFT) Internet Explorer.  The Trojan is used to carry out traditional malware activities, such as spamming and bank transaction interception/modification.

I. Hackers Steal From the Rich, Give to Themselves With Op. High Roller

Now even as researchers continue to struggle with Zeus and its successor SpyEye, there's an even more sinister malware storm brewing that Guardian Analytics and Intel Corp. (INTC) subsidiary McAfee have been tracking [PDF], dubbed "Operation High Roller".

The new attack is much more organized, driven via cloud controllers, versus Zeus where infected machines often operated in a rogue lone manner.

Using cloud servers, machines infected with High Roller Trojans are hit with server-based fraudulent bank transactions totaling up to $130,000 USD (€100,000).  These very large transactions are ferried through "mule" accounts also operated by the control-servers.  The attacks use Zeus or SpyEye for reconnaissance and then use compromised local machines to target large accounts via "spear phishing" tactics.

Spear phishing email
An example "spear phishing" message from an infected machine. [Image Source: McAfee]

The new multi-approach malware is able to circumvent typical "chip and pin" physical security features, such as the smartcard reader ID systems commonly used in Europe.  It targets primarily "high rollers" -- accounts with more than €250,000, the kind commonly maintained by wealthy individuals and corporations.  This differs from Zeus and other past attacks that primarily targeted the masses with smaller transactions

Euros
Op. high roller is stealing millions from the wealthy [Image Source: The Hibernia Times]

II. Sophisticated Cloud-Commanded Malware Hits U.S.

The attacks initially targeted Europe, but have since spread to the U.S. and Columbia.  The hardest hit region in Europe, according to McAfee is the Netherlands, which suffered over €141M ($175M USD).  However attacks in the U.S. are also escalating with 8 to 10 malware variants currently attacking 109 businesses.

Texas is the state currently being hardest hit by the attacks.  Numerous account holders in New York, Georgia, and California were also targeted.  

High Roller attacks
Many states have been hit by Operation High Roller. [Image Source: McAfee]

Most of the attacks originated from command-and-control servers than Russia, though some C&C servers were also found in China and the U.S., among other places.

Source: McAfee



Comments     Threshold


This article is over a month old, voting and posting comments is disabled

By leviathan05 on 6/27/2012 2:37:48 PM , Rating: 2
Something like 10% of all workers in the U.S. are employed by a government agency of some sort. You think that is understaffed? When you add in contractors that are primarily supported by the government it shoots up closer to 20%. When you add in people receiving welfare you are now around 25% of working Americans that are directly funded by the government. What percentage do you think should work for the government? 30%? 40%? And you want to tax the rest of the workers to pay for those employees? And you wonder why people think differently than you?


"Nowadays you can buy a CPU cheaper than the CPU fan." -- Unnamed AMD executive














botimage
Copyright 2014 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki