Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
A malware campaign launched against customers at 30 US banks is continuing, researchers say.
McAfee supported an October warning from RSA that a Russian cyber gang was preparing to infect users with a variant of the Gozi trojan called Prinimalka.
The company also disclosed new information about an earlier Gozi Prinimalka campaign, between March and April of this year, when attackers infected at least 500 individuals throughout the United States with the trojan.
The company also discovered that the group would be ready to strike as early as next autumn.
Gozi Prinimalka enables fraudsters to initiate unauthorised wire transfers on their behalf by hijacking live banking sessions and was updated by developers to perform similar functions as the Zeus and SpyEye banking trojans.
RSA's fraudaction research lab Limor Kessem told SC Prinimalka was privately sold while Zeus and SpyEye, was a commercial underground offering.
“We have really analysed and reverse-engineered Gozi since around 2010,” Kessem said.
“We saw that it's added a lot of features that we know from Zeus and SpyEye – for instance, man-in-the-browser automated capabilities.”
McAfee threat researcher Ryan Sherstobitoff told SC each malicious binary was encrypted uniquely which helped the trojan to evade detection.
“You would have to update your anti-virus setting every time to detect it,” Sherstobitoff said. “Any future variant should be detected using behavior-based anti-virus [solutions].”
McAfee researchers said national and investment banks in the US will be the major targets of Prinimalka fraudsters, with a small percentage being credit unions.
The group's plan will likely be to continue on in their previous strategy: strike, then disappear until their next campaign unfolds.
“This could very well be a threat in 2013,” Sherstobitoff said.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.