SafeUM
Home Blog Services Download Help About Recharge
EN
RU

Axarhöfði 14, 110 Reykjavik, Iceland

Iceland - 2015
SafeUM
Blog
Services
Download
Help
About
Recharge
Menu
EN
Lang
EN
RU
Archive
TOP Security!
16 Nov 2017

New IcedID trojan targets US banks

Researchers are warning users about a wave of recent attacks targeting U.S. financial institutions that leverage a new banking Trojan dubbed IcedID.

The IcedID Trojan was spotted in September by researchers at IBM’s X-Force Research team. They said the Trojan has several standout techniques and procedures, such as the ability to spread over a network and the ability to monitor a browser’s activity by setting up a local proxy for traffic tunneling.

“At this time, the malware targets banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S.,” researchers wrote in a report released Monday explaining the discovery. Two U.K.-based banks are also targeted by the malware. Similar to the TrickBot and Dridex Trojans, IcedID both webinjection and redirection attack techniques, researchers said.

“While it is still early to tell how it will fare, its current capabilities, distribution choices and targets point to a group that is no stranger to this domain,” wrote Limor Kessem, Maor Wiesen, Tal Darsan and Tomer Agayev, the X-Force researchers who co-authored the report.

They said IcedID is being distributed by the Emotet Trojan, which is used as a dropper to put IcedID on targeted systems. Emotet is known for its spam campaigns, designed to look like messages from banks, which contain malicious .zip archives.

“IcedID possesses the ability to move to other endpoints, and X-Force researchers also observed it infecting terminal servers,”  X-Force reports. “Terminal servers typically provide terminals, such as endpoints, printers and shared network devices, with a common connection point to a local area network or a wide area network, which suggests that IcedID has already been targeting employee email to land on organizational endpoints.”

To maintain persistence on hosts, IcedID creates a RunKey in the registry of the host’s Windows system that allows it to survive reboots. According to X-Force, IcedID requires a reboot to complete its full deployment. The reboot also serves as way to attempt to evade analysis via sandboxes that do not emulate rebooting, researchers said.

Once the malware components are in place the victim has their internet traffic redirected through a local proxy that the adversary controls. “The malware listens for the target URL from the list (of financial institutions) and, once it encounters a trigger, executes a designated webinjection. The webinjection sends the victim to a fake bank site set up in advance to match the one originally requested,” researchers wrote.

That fake bank site is a “web-based remote panel” prompting a user for a username and password combination. To thwart detection by the end user, the malware redirects traffic at the same time keeping the bank’s correct URL in the address bar. That live connection also means the bank’s correct SSL certificate always shows.

“From that point on, the attacker controls the session the victim goes through, which typically includes social engineering to trick the victim into divulging transaction authorization elements,” researchers report. Communication between host and the attacker’s command-and-control server is via SSL.

Tags:
USA information leaks trojan fraud
Source:
Threatpost
621
Other NEWS
7 Jun 2018 safeum news imgage VPNFilter malware infecting 500,000 devices is worse than we thought
4 Jun 2018 safeum news imgage Hackers target Booking.com in criminal bid to steal hundreds of thousands from customers
1 Jun 2018 safeum news imgage Operator of World's Top Internet Hub Sues German Spy Agency
30 May 2018 safeum news imgage US says North Korea behind malware attacks
29 May 2018 safeum news imgage Facebook and Google targeted as first GDPR complaints filed
25 May 2018 safeum news imgage A new reason to not buy these cheap Android devices
24 May 2018 safeum news imgage Flaws in smart pet devices, apps could come back to bite owners
23 May 2018 safeum news imgage Google sued for 'clandestine tracking' of 4.4m UK iPhone users' browsing data
21 May 2018 safeum news imgage LocationSmart reportedly leaked phone location data onto the web
18 May 2018 safeum news imgage The SEC created its own scammy ICO to teach investors a lesson
17 May 2018 safeum news imgage Thieves suck millions out of Mexican banks in transfer heist
17 May 2018 safeum news imgage US cell carriers are selling access to your real-time phone location data
16 May 2018 safeum news imgage Australia looking into claim Google harvests data while consumers pay
15 May 2018 safeum news imgage Hacking train Wi-Fi may expose passenger data and control systems
15 May 2018 safeum news imgage Huge new Facebook data leak exposed intimate details of 3m users
All news
SafeUM
Confidential Our technologies Company
Follow us
Download
SafeUM © Safe Universal Messenger

Axarhöfði 14,
110 Reykjavik, Iceland

Iceland - 2015