A group of cyber criminals has pledged to launch a “Trojan attack spree” on US banks this autumn, security firm RSA has warned.
A cyber army of 100 botmasters will be running the attack, which will amount to “the most substantial organized banking-Trojan operation” ever, according to RSA.
However, after they sent out communications across hacker forums, in being caught out by such a major security firm the cyber criminals may have shot themselves in the foot.
“According to underground chatter, the gang plans to deploy the Trojan in an effort to complete fraudulent wire transfers via Man-In-The-Middle (MiTM) manual session-hijacking scenarios,” said Mor Ahuvia, cyber crime communications specialist at RSA, in a blog post.
“Previous incidents involving this Trojan, handled by RSA and other information security vendors, appear to corroborate the gang’s claims that since 2008 their Trojan has been at the source of siphoning $5 Million from American bank accounts.
“Gozi Prinimalka’s similarity to the Gozi Trojan, both in technical terms and its operational aspects, suggests that the HangUp Team – a group that was previously known to launch Gozi infection campaigns – or a group closely affiliated with it, may be the troupe behind this ambitious scheme.”
Ahuvia said that the hackers were most likely targeting American institutions because of their lack of two-factor authentication, which makes it considerably harder to initiate MiTM attacks.
According to the group’s messages, they have been holding boot-camps similar to X Factor-esque talent competitions, to determine which botmasters can take part. Those that get through the approval process will get a slice of the proceedings from the hits.
The attacks will have some noticeably advanced technical features that could help them avoid detection.
“A novel virtual-machine-synching module announced by the gang, installed on the botmaster’s machine, will purportedly duplicate the victim’s PC settings, including the victim’s time zone, screen resolution, cookies, browser type and version, and software product IDs,” said Ahuvia.
“Impersonated victims’ accounts will thus be accessed via a SOCKS proxy connection installed on their infected PCs, enabling the cloned virtual system to take on the genuine IP address when accessing the bank’s website,” he added.
Banks in the US have been getting battered by distributed denial of service (DDoS) attacks this month. Wells Fargo, J.P. Morgan Chase & Co and Bank of America have all experienced disruption on their customer-facing sites as a result of massive DDoS attacks.
Are you a security pro? Try our quiz!
Suspended prison sentence for Craig Wright for “flagrant breach” of court order, after his false…
Cash-strapped south American country agrees to sell or discontinue its national Bitcoin wallet after signing…
Google's change will allow advertisers to track customers' digital “fingerprints”, but UK data protection watchdog…
Welcome to Silicon In Focus Podcast: Tech in 2025! Join Steven Webb, UK Chief Technology…
European Commission publishes preliminary instructions to Apple on how to open up iOS to rivals,…
San Francisco jury finds Nima Momeni guilty of second-degree murder of Cash App founder Bob…