Feeds

UK police issue 'vicious' Trojan alert

Keystroke-logging 'Swiss army knife'

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Britain's top cybercrime fighters have joined up with the banking industry today in warning of the latest attempt to defraud online banking customers. The attacks, in the form of 'Trojan horse' emails, have been spammed out to a number of email account holders randomly across the country. The emails contain links to malicious websites in North America and China. The UK's National Hi-Tech Crime Unit (NHTCU) is working with the Internet industry to have these sites shut down. At the time of writing three have been taken out of commission but others remain active.

NHTCU and banking organisation APACS have teamed up to warn on the threat in a highly unusual move that underlines the seriousness of the risk. An NHTCU spokeswoman explained: "This is really vicious. It's just a normal phishing attack but something that tries to install backdoors on victims' PCs".

Touch of Evil

The spam emails contain details of a fictitious order for Web hosting or computer goods and thank the email recipient for a non-existent order. In addition, they also display the apparent cost that will be charged to their credit card. The email also contains a link to one of a number of maliciously constructed website in order to "view the order in more detail". If an email recipient is duped into visiting one of these sites, it appears merely as a site under construction. But in the background malign actions are afoot designed to load a variant of the Mitglieder proxy Trojan onto vulnerable Windows boxes.

These maliciously constructed sites harbour a Trojan downloader routine capable of dropping a keystroke logging program onto vulnerable PCs. This exploit is possible because of well-known Windows security bugs, namely an MHTML URL vulnerability (MS04-013) and an ADODB.Stream vulnerability. Both of thses flaws can be fixed by the latest Internet Explorer megapatch (MS04-025).

If a machine becomes infected, the next time a customer uses their PC to access their own online banking site, the Trojan can potentially record their secret passwords and PINs used to log-on. This information is accessible to attackers thereby compromising the security of victim's online banking accounts. In addition, the Trojan surrenders control of the machine to attackers. It's unclear how many users have been hit by the attack.

Protect and survive

Although the threat from Trojans is a serious one if precautions and advice are not taken, the banking industry offers a number of security measures to defend against these types of attack. These include partial passwords, so not all characters from a password are revealed at any one time. This is further enhanced by the use of drop-down lists, which rely on the use of a mouse to select alphabetic or numerical characters. In addition, some banks also offer customers the opportunity to purchase reduced-price security software via their websites.

Sandra Quinn, Director of Corporate Communications at APACS, said: "By being wary of unsolicited emails and maintaining basic security measures on your computer you can go online with confidence."

APACS refers consumers to its previously published guidelines on safe computing.

Detective Chief Superintendent Len Hynds, Head of the NHTCU said: "The NHTCU is continuing to work hard to bring the perpetrators of these elaborate scams to justice. The criminals behind these attacks are constantly evolving their techniques and changing tactics to target a wider range of victims. With this range of exploits being blended in one piece of code, it is not just about online banking. There is a second keylogger and a program that allows the machine to act as a mail proxy that could be used by spammers. It is the Swiss Army knife of the cyber-criminal." ®

Related stories

Cybercops seize Russian extortion masterminds
UK police arrest 12 phishing mule suspects
UK police arrest copycat phisher
UK banks and police proffer anti-phishing advice

Beginner's guide to SSL certificates

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.