Phishing danger increases as Storm botnet is hired out

Posted by   Virus Bulletin on   Jan 15, 2008

Smart new trojan and Storm diversification add to online banking risk.

The dangers of banking online grew significantly in past weeks, as portions of the ever-expanding Storm botnet were hired out to run phishing campaigns and a sophisticated new trojan was discovered, capable of targeting 400 different online banking systems around the world.

With the network of systems compromised by the Storm attack having doubled over the Christmas period, according to reports from Spamhaus (details and comment at here), portions of the vast botnet have been put to use operating phishing sites targeting UK banks including Halifax and Barclays.

With segments of the network first seen rented out for spamming purposes in October last year, the latest development presents further evidence of the network's size and stealthy structure being put to use for fraud and financial gain.

An even more worrying trend is the emergence of a highly sophisticated new trojan targeting a wide range of banks. The trojan's man-in-the-middle capability allows attackers to bypass two-factor authentication by inserting themselves between the user and the bank.

The attack, dubbed 'SilentBanker' by Symantec, recognises and targets online banking sites operated by 400 different banks from many countries. Configuration data is updated frequently, multiple browsers are handled, and banking requests can apparently be redirected silently via a malicious server, enabling transactions to be rerouted to accounts of the attackers' choice. The enhanced functionality only targets certain banks, with most hit using more standard fake login pages to steal bank access information.

More details of the Storm phishing campaigns are at F-Secure here and at ESET here. Further information on the 'SilentBanker' trojan is at Symantec here.

Posted on 15 January 2008 by Virus Bulletin



Latest posts:

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

VB2019 paper: A study of Machete cyber espionage operations in Latin America

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the…

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to…

VB2019 paper: Oops! It happened again!

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Job vacancy at VB: Security Evangelist

Virus Bulletin is recruiting for a person to be the public face of the company

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.