Source code for tiny 'Tinba' banking malware leaked
Code has appeared in an underground forum, according to Denmark-based security company CSIS
IDG News Service - The source code for an impressively small but capable malware program that targets online bank accounts has been leaked, according to CSIS Security Group of Denmark.
The program, known as "Tinba" or "Zusy," was discovered around mid-2012 and infected tens of thousands of computers in Turkey. It is notable for having a very small code base -- just 20K -- but capabilities similar to malware much larger in size.
Last week, CSIS found a post in an underground forum that included source code for Tinba, which turned out to be the same code studied a couple of years ago by the company, wrote Peter Kruse, CTO of CSIS.
The leak of its source code means other cybercriminals could begin using it, as such programs are often only offered for sale in forums. The source code for an online banking malware program called Zeus was leaked in 2011, which opened up its use to a wider range of cybercriminals, CSIS noted.
Although Tinba's source code release is unlikely to have the same impact as Zeus, "making the code public increases the risk of new banker Trojans to arise based partially on Tinba source code," Kruse wrote. The code appears to be from an early version of Tinba.
Kruse wrote that CSIS gave a presentation at a recent conference in Boston that covered Tinba, which described how its analysts believe the original malware code was sold and then improved upon by other developers.
Tinba can interfere with online banking sessions, creating new fields that users must fill out during an online banking session. That information can then be used to compromise their accounts.
In a joint report released in 2012, CSIS and Trend Micro wrote that more than 60,000 computers in Turkey appeared to be infected with Tinba. Tinba appeared to be distributed using Blackhole, a now shuttered exploit kit that probed computers for software vulnerabilities and delivered malware if a computer doesn't have current patches.
Send news tips and comments to email@example.com. Follow me on Twitter: @jeremy_kirk
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!