Nov 07, 2012 (07:11 AM EST)
Malware Tools Get Smarter To Nab Financial Data
Read the Original Article at InformationWeek
That's the price for the latest version of the Citadel malware, code-named Rain Edition (188.8.131.52), which includes all of the latest malware mod cons: advanced Firefox and Chrome data-stealing plug-ins, advanced Web injection techniques to modify code on targeted websites, and easier updating for Trojan files that have been used to infect PCs. The malware also sports an easy-to-use, browser-based interface for running the command-and-control (C&C) infrastructure that sends instructions to infected PCs in the botnet -- and retrieves stolen data -- as well as infection analytics.
Of course, that's assuming you could even obtain a copy of Citadel. "Getting your hands on Citadel is more difficult because of a stricter validation process within the Russian underground," said Jerome Segura, a senior security researcher at Malwarebytes, in a blog post. "The makers of Citadel are trying to keep a low enough profile to avoid gathering too much attention which could result in efforts to go after them -- as we have seen with Zeus." Accordingly, it's only available on selected Russian-language underground forums.
[ Read Windows 7 Malware Infection Rates Soar. ]
As with much of the malware that's in circulation today, Citadel is designed to commit financial crimes. "The main purpose of Citadel is to steal banking credentials," said Segura, noting that the malware includes built-in capabilities that allow attackers to search victims' PCs for credentials related to specific banks. Most of the infected PCs, meanwhile, get managed by attackers using so-called bulletproof hosting providers. Predominantly located in Russia and China, these services will turn a blind eye to any cybercrime committed using their services, typically as long as it doesn't affect anyone inside their country's borders.
Although financial malware and banking Trojans are in common use, another leading application for botnet-managed malicious code is for perpetrating click fraud, typically by using malware to generate fake advertising impressions. According to a report on malware trends released by Kindsight Security Labs, the most active botnet from July to September of this year was ZeroAccess, which is actively infecting an estimated 685,000 PCs in the United States, and 2.2 million worldwide.
Kindsight estimates that on a daily basis, ZeroAccess botnets alone generate "about 140 million fraudulent ad-clicks and 260 terabytes of network traffic," costing advertisers $900,000 in lost advertising impressions per day. Of course, the malware can also be used to steal financial credential, sniff keystrokes and steal BitCoins.
Although malware remains the preferred tool for online criminals who want to steal financial details, recent advanced in espionage malware highlight its use for more political purposes as well.
For example, the most recent version of the Gh0st malware, which is designed to steal sensitive data, has lately added in a repurposed version of the Russian-built DarKDdoser tool, which can steal any passwords stored in the Mozilla Firefox browser, as well as launch three flavors of distributed denial-of-service attacks -- UDP floods, SYN floods, and HTTP floods -- according to a blog post from Vinay Pidathala, a security content researcher at FireEye.
The addition of DDoS capabilities is interesting, given that Gh0st previously has been used to launch cyberespionage attacks against targets in Iran, India, Germany, Thailand and other parts of Asia regions, in the pursuit of military, diplomatic, political and economic intelligence. Based in part on its use in an attack against the Dalai Lama and pro-Tibetan groups, security experts have suggested that many Gh0st attacks can be traced to China.
Gh0st is part of a class of Trojan application known as the remote administration tool (RAT), which can be used to take complete control of an infected system, typically via an advanced persistent threat (APT) attack.
Although RATs have been used for years, they came to prominence last year after McAfee published details of a command-and-control website tied to a tool it dubbed Shady RAT. Alarmingly, the tool had been used for at least five years, to compromise at least 72 organizations, including 22 governmental agencies and contractors, over a period of five years. Based on the targets and techniques used, many security experts suspect that, as with Gh0st, the Chinese government was backing Shady RAT.
The continued updating of Gh0st, as well as banking Trojans such as Citadel, demonstrates that such software continues to remain highly effective at infecting targeted PCs, and obtaining data that offers economic or political upsides.
Faster networks are coming, but security and monitoring systems aren't necessarily keeping up. Also in the new, all-digital Data Security At Full Speed special issue of InformationWeek: A look at what lawmakers around the world are doing to add to companies' security worries. (Free registration required.)