Feeds

Another RAT crawls out of the malware drain

Dyreza/Dyre MITMs SSL sessions

Beginner's guide to SSL certificates

Yet another banking trojan has appeared, using browser hooking to steal data from Internet Explorer, Chrome and Firefox users.

Dyreza, or Dyre, is pitched the usual way, via a phishing e-mail (a lesson that's never learned well enough for the approach to fail), and the e-mail contains what purports to be a zipped document that actually drops the malware payload.

Danish researchers CSIS say they've identified command and control servers, and were able to view money-mule accounts in Latvia associated with on of the servers. CSIS also warns that the payload's code suggests a future attack is planned, in which th phishing e-mail will purport to be a Flash Player update.

The extra sauce in Dyreza is that it tries to launch a man-in-the-middle attack to capture traffic users think is encrypted, and tries to crack two-factor authentication.

An infected user's browser traffic is controlled by the attackers, writes CSIS's Peter Kruse, meaning attackers “are able to read anything, even SSL traffic in clear text. This way they will also try to circumvent 2FA.”

PhishMe, which calls the Trojan Dyre, says the infected user will believe they're establishing SSL sessions, but the “attacker can bypass the SSL mechanism of a web page”.

That's because the malware intercepts user requests and redirects them to IPs the attackers control.

Both PhishMe and CSIS believe it's a new RAT (remote access trojan) rather than another Zeus variant. CSIS has identified Bank of America, Natwest, Citibank, RBS and Ulsterbank as target institutions, but there may be more. ®

Intelligent flash storage arrays

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
Oi, Europe! Tell US feds to GTFO of our servers, say Microsoft and pals
By writing a really angry letter about how it's harming our cloud business, ta
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.