Categories: SecurityWorkspace

Cyber Gang Planning Massive Trojan War On US Banks

A group of cyber criminals has pledged to launch a “Trojan attack spree” on US banks this autumn, security firm RSA has warned.

A cyber army of 100 botmasters will be running the attack, which will amount to “the most substantial organized banking-Trojan operation” ever, according to RSA.

However, after they sent out communications across hacker forums,  in being caught out by such a major security firm the cyber criminals may have shot themselves in the foot.

RSA said it had linked the group to malware known as Gozi Prinimalka. Warnings will now go out to banks about what is happening and security firms will most likely rush to block the threat. RSA has also contacted the relevant US law enforcement bodies.

Kicking off a Trojan war

“According to underground chatter, the gang plans to deploy the Trojan in an effort to complete fraudulent wire transfers via Man-In-The-Middle (MiTM) manual session-hijacking scenarios,” said Mor Ahuvia, cyber crime communications specialist at RSA, in a blog post.

“Previous incidents involving this Trojan, handled by RSA and other information security vendors, appear to corroborate the gang’s claims that since 2008 their Trojan has been at the source of siphoning $5 Million from American bank accounts.

“Gozi Prinimalka’s similarity to the Gozi Trojan, both in technical terms and its operational aspects, suggests that the HangUp Team – a group that was previously known to launch Gozi infection campaigns – or a group closely affiliated with it, may be the troupe behind this ambitious scheme.”

Ahuvia said that the hackers were most likely targeting American institutions because of their lack of two-factor authentication, which makes it considerably harder to initiate MiTM attacks.

According to the group’s messages, they have been holding boot-camps similar to X Factor-esque talent competitions, to determine which botmasters can take part. Those that get through the approval process will get a slice of the proceedings from the hits.

The attacks will have some noticeably advanced technical features that could help them avoid detection.

“A novel virtual-machine-synching module announced by the gang, installed on the botmaster’s machine, will purportedly duplicate the victim’s PC settings, including the victim’s time zone, screen resolution, cookies, browser type and version, and software product IDs,” said  Ahuvia.

“Impersonated victims’ accounts will thus be accessed via a SOCKS proxy connection installed on their infected PCs, enabling the cloned virtual system to take on the genuine IP address when accessing the bank’s website,” he added.

Banks in the US have been getting battered by distributed denial of service (DDoS) attacks this month. Wells Fargo, J.P. Morgan Chase & Co and Bank of America have all experienced disruption on their customer-facing sites as a result of massive DDoS attacks.

Are you a security pro? Try our quiz!

Thomas Brewster

Tom Brewster is TechWeek Europe's Security Correspondent. He has also been named BT Information Security Journalist of the Year in 2012 and 2013.

Recent Posts

Craig Wright Sentenced For Contempt Of Court

Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…

2 days ago

El Salvador To Sell Or Discontinue Bitcoin Wallet, After IMF Deal

Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…

2 days ago

UK’s ICO Labels Google ‘Irresponsible’ For Tracking Change

Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…

2 days ago

EU Publishes iOS Interoperability Plans

European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…

3 days ago

Momeni Convicted In Bob Lee Murder

San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…

3 days ago