Feeds

FBI and pals grab banking Trojan zombielord's joystick

'Shylock' mostly spread through LEGIT websites

Internet Security Threat Report 2014

Law enforcement and the security business have teamed up to disrupt the operation of the Shylock banking Trojan.

The UK's National Crime Agency joined forces with Europol and the FBI to take down and seize the command and control servers key to running the botnet. Law enforcement also took control of the domains Shylock uses for communication between infected computers.

Shylock - so named because its code contains excerpts from Shakespeare’s Merchant of Venice - has infected at least 30,000 computers running Windows worldwide since it first surfaced in 2011.

Victims are often hit through attacks based on planting malicious code on mainstream websites. This code exploits browser vulnerabilities and the like to push malware onto the systems of visiting surfers.

Research from BAE Systems Applied Intelligence on Shylock last year suggested its main distribution channel is legit websites (305 of 500 sources in UK). The same analysis (PDF) published last November suggested four in five instances of the malware targeted UK banks.

Both individuals and small/medium businesses in the UK, the Netherlands, Germany and Italy have been left out of pocket as a result of the malware. The extent of these losses is unclear.

Intelligence suggests that the Trojan has been disproportionately targeted at UK banking customers, although the suspected developers are based elsewhere.

The UK's NCA led the op, which it described as the first of its kind for the police agency. Law enforcement takedowns of zombie networks in general are not an infrequent occurrence.

Other companies and organisations involved in Operation Shylock include BAE Systems Applied Intelligence, GCHQ, Dell SecureWorks, Kaspersky Lab and the German Federal Police.

A detection and removal tool for Shylock has been released by ‪Heimdal Security‬. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.