Powerful Dyreza banking malware emerges
Malware uses browser hooking to conduct a man-in-the-middle attack, security companies say
IDG News Service - Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware.
The malware, which is being called "Dyreza" or "Dyre," uses a man-in-the-middle attack that lets the hackers intercept unencrypted web traffic while users mistakenly think they have a secure connection with their online banking site.
Although Dyreza has similarities with Zeus, "we believe this is a new banker trojan family and not yet another offspring from the Zeus source code," according to a writeup by CSIS, a Danish security company.
Dyreza uses a technique called "browser hooking" to view unencrypted web traffic, which involves compromising a computer, capturing unencrypted traffic and then stepping in when a user tries to make a secure SSL (Secure Sockets Layer) connection with a website.
During an attack by Dyreza, a user thinks their authentication credentials are going to a legitimate bank, but the malware actually redirects the traffic to their own servers, wrote Ronnie Tokazowski, a senior researcher at PhishMe, another security company that has studied the attack. Users mistakenly think they have connected over SSL to their bank's server.
Dyreza is programmed to intercept credentials when a person navigates to the websites of Bank of America, NatWest, Citibank, RBS and Ulsterbank, wrote Peter Kruse, who is head of CSIS's eCrime Unit and CTO for CSIS's Security Group.
The malware is being distributed through spam messages, some of which supposedly contain an invoice as a ".zip" file. To help evade URL scanners that might block messages with known suspicious domains, the attackers have been hosting the malware on legitimate domains.
One of the services that has been abused is LogMeIn's "cubby.com," which is a file storage service, Tokazowski wrote. Dropbox had been used in the past, but Tokazowski wrote that the service moves quickly to block phishing links. Using trusted domains from legitimate services can help extend the life of a malicious link.
It appears the attackers have also set up other infrastructure to facilitate the transfer of money from victims' accounts. Kruse wrote that CSIS managed to locate some of the command-and-control servers for Dyreza, uncovering a customized money mule panel with accounts in Riga, Latvia. Money mules are people who agree to briefly hold stolen funds in their own accounts before forwarding the funds elsewhere.
Kruse wrote it was unclear if the people who wrote Dyreza are holding it close and using it for themselves or are renting it out to other criminal outfits, as was done with Zeus.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- Top 3 Myths about Big Data Security : Debunking common misconceptions about big data security Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are...
- A More Predictable Way to Budget Software Costs Wavetronix enables creative collaboration while cost-effectively accessing all the latest tools with Adobe Creative Cloud for teams. For Wavetronix, collaboration was easy when...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface. All Data Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!