Categories: SecurityWorkspace

Rapid Spread Of Cracked SpyEye Trojan Code Expected

The source code for the SpyEye Trojan has been released, raising the possibility that one of the most prevalent Trojans in the wild could become an even bigger threat.

The leak was the work of a French researcher called Xyliton, part of the RED (Reverse Engineers’ Dream) Crew, who released a tutorial to crack a copy of SpyEye builder 1.3.45, Sean Bodmer, a senior threat intelligence analyst at Damballa, wrote on the company’s The Day Before Zero blog. This “leak” is important because it illustrates the coding techniques used by the Gribo-Demon’s team, authors of SpyEye, Bodmer said.

SpyEye Will Be More Pervasive

SpyEye was first detected in late 2009, around the time the Zeus banking Trojan was dominating the malware landscape. Both malware families targeted bank account credentials and other sensitive data to steal money from user bank accounts.

SpyEye and Zeus were also both available on underground markets as software builders, or toolkits, that other less-savvy cyber-criminals could use to launch new attack campaigns. SpyEye builder kits were sold on the black market for as much as $10,000 (£6,077), according to researchers.

“SpyEye has been on everyone’s priority list of threat discussions for quite some time, and is now going to become an even more pervasive threat,” Bodmer said.

Zeus functionality and code started appearing in the SpyEye malware kit in early 2011, prompting security experts to speculate the developers had combined efforts and that new development for Zeus would cease. That has not turned out to be the case as there has been some work on Zeus since the code merger. Zeus source code was leaked in March, making it possible for anyone to modify the source code and create even more powerful Zeus variants.

“Damballa labs has been tracking dozens of new Zeus bot operators since the leak earlier this year, and now that SpyEye has been outed, it is only a matter of time before this becomes a much larger malware threat than any we have seen to date,” Bodmer said.

UK Banks Targeted

SpyEye activity has been growing in recent months, with 53 percent of SpyEye bots targeting financial institutions in the United Kingdom but slightly more (60 percent) targeting banks in the United States, according to a recent report from Trusteer.

The RED Crew tutorial provided instructions on how to crack the hardware identification scheme on SpyEye builder 1.3.45 to lock the software to a specific hardware device. People who bought the toolkit could use it only on one machine, according to Bodmer, who said it was possible to crack the VMProtect tool used on the builder in less than 15 minutes with the tutorial.

With VMProtect broken, the builder could be traded freely among criminals and not be limited to only one machine per purchased copy. SpyEye variants created by using the cracked toolkit would be missing an attribution field in the code. Damballa has already identified new builders with the eliminated field selling for as low as $95 on the black market.

“Reverse Engineering is nothing new, but putting in the hands of babes one of the most powerful cyber-threats today, ‘for free’, is something that will mean even more sleepless nights for security administrators,” Bodmer said, calling the tutorial a “silver platter” for cyber-criminals.

New Versions In The Pipeline

SpyEye developers have already released version 1.3.48 of the builder and newer versions are in the works, Bodmer said. The tutorial is not expected to work on later versions and the team behind the malware toolkit will be building in more protections to make it harder to crack, according to Bodmer. However, considering how expensive the builder is, many criminals will continue using the older and cheaper version of the toolkit to develop their campaigns, Bodmer predicted.

There is some good news for security researchers, too, as they can now begin hunting for security vulnerabilities in SpyEye, in the same manner that cyber-criminals look for bugs in legitimate software to exploit. Security vendors will also be able to create signatures to detect SpyEye variants, Bodmer said. There are also sites that identify command-and-control servers used by the Trojan that companies can download to blacklist SpyEye traffic.

Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Share
Published by
Fahmida Y Rashid eWEEK USA 2014. Ziff Davis Enterprise Inc. All Rights Reserved.

Recent Posts

Northvolt Mulls US Bankruptcy Protection – Report

Troubled battery maker Northvolt reportedly considers Chapter 11 bankruptcy protection in the United States as…

12 hours ago

FTC Plans Investigation Into Microsoft Cloud Business – Report

Microsoft's cloud business practices are reportedly facing a potential anti-competitive investigation by the FTC

14 hours ago

Programmer Sentenced To Five Years In Prison For Bitcoin Laundering

Ilya Lichtenstein sentenced to five years in prison for hacking into a virtual currency exchange…

16 hours ago

Hate Speech Watchdog CCDH To Quit Musk’s X

Target for Elon Musk's lawsuit, hate speech watchdog CCDH, announces its decision to quit X…

1 day ago

Meta Fined €798m Over Alleged Facebook Marketplace Violations

Antitrust penalty. European Commission fines Meta a hefty €798m ($843m) for tying Facebook Marketplace to…

1 day ago

Elon Musk Rebuked By Italian President Over Migration Tweets

Elon Musk continues to provoke the ire of various leaders around the world with his…

1 day ago