A group of cyber criminals has pledged to launch a “Trojan attack spree” on US banks this autumn, security firm RSA has warned.
A cyber army of 100 botmasters will be running the attack, which will amount to “the most substantial organized banking-Trojan operation” ever, according to RSA.
However, after they sent out communications across hacker forums, in being caught out by such a major security firm the cyber criminals may have shot themselves in the foot.
“According to underground chatter, the gang plans to deploy the Trojan in an effort to complete fraudulent wire transfers via Man-In-The-Middle (MiTM) manual session-hijacking scenarios,” said Mor Ahuvia, cyber crime communications specialist at RSA, in a blog post.
“Previous incidents involving this Trojan, handled by RSA and other information security vendors, appear to corroborate the gang’s claims that since 2008 their Trojan has been at the source of siphoning $5 Million from American bank accounts.
“Gozi Prinimalka’s similarity to the Gozi Trojan, both in technical terms and its operational aspects, suggests that the HangUp Team – a group that was previously known to launch Gozi infection campaigns – or a group closely affiliated with it, may be the troupe behind this ambitious scheme.”
Ahuvia said that the hackers were most likely targeting American institutions because of their lack of two-factor authentication, which makes it considerably harder to initiate MiTM attacks.
According to the group’s messages, they have been holding boot-camps similar to X Factor-esque talent competitions, to determine which botmasters can take part. Those that get through the approval process will get a slice of the proceedings from the hits.
The attacks will have some noticeably advanced technical features that could help them avoid detection.
“A novel virtual-machine-synching module announced by the gang, installed on the botmaster’s machine, will purportedly duplicate the victim’s PC settings, including the victim’s time zone, screen resolution, cookies, browser type and version, and software product IDs,” said Ahuvia.
“Impersonated victims’ accounts will thus be accessed via a SOCKS proxy connection installed on their infected PCs, enabling the cloned virtual system to take on the genuine IP address when accessing the bank’s website,” he added.
Banks in the US have been getting battered by distributed denial of service (DDoS) attacks this month. Wells Fargo, J.P. Morgan Chase & Co and Bank of America have all experienced disruption on their customer-facing sites as a result of massive DDoS attacks.
Are you a security pro? Try our quiz!
Fourth quarter results beat Wall Street expectations, as overall sales rise 6 percent, but EU…
Hate speech non-profit that defeated Elon Musk's lawsuit, warns X's Community Notes is failing to…
Good luck. Russia demands Google pay a fine worth more than the world's total GDP,…
Google Cloud signs up Spotify, Paramount Global as early customers of its first ARM-based cloud…
Facebook parent Meta warns of 'significant acceleration' in expenditures on AI infrastructure as revenue, profits…
Microsoft says Azure cloud revenues up 33 percent for September quarter as capital expenditures surge…