VB2014 paper: The evolution of webinjects

Posted by   Virus Bulletin on   Oct 13, 2014

Jean-Ian Boutin looks at the increased commoditization of webinjects.

Virus Bulletin has always been about sharing information, and the Virus Bulletin conference is an important part of that. We would love to be able to share some of the discussions attendees had during the lunch and coffee breaks, the late-night or early-morning meetings in the hotel lobby, and the inspiration one gets from being around such bright minds.

Of course, we are unable to do that. But what we can do is share some of the technical content presented during VB2014. Over the next months, we will be sharing conference papers as well as video recordings of the presentations. We start off this series with the paper "The evolution of webinjects" by ESET researcher Jean-Ian Boutin.

Webinjects, where the trojan modifies the content of a targeted website on the fly before displaying it in the browser, have become ubiquitous in today's banking trojans. They are used for a wide range of malicious activities to aid financial fraud, from phishing for credentials to bypassing two-factor authentication.

  Content removal using a webinject. In the bottom page, the security warnings are removed.

In his paper, Jean-Ian looks at how webinjects have evolved over time. Banks are constantly improving the security of their online systems, and the use of webinjects is one way in which malware authors are trying to keep up. In many of today's banking trojans, webinjects are the core of the attack code.

In line with a general trend in cybercrime, webinjects have become increasingly commoditized. As a consequence, most modern banking trojans are now using the same format for the webinject configuration file.

Malicious actors, many of whom have ties with traditional organized crime groups, sell such configuration files on underground forums, allowing crooks operating banking malware to target many financial institutions without having to reverse engineer the format used for online transactions by each individual institution.

  Standard webinject configuration file format.

You can read Jean-Ian's paper here in HTML-format, or download it here as a PDF (no registration or subscription required). You can download the presentation slides here. We have also uploaded the presentation to our YouTube channel.



Posted on 13 October 2014 by Martijn Grooten
twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

VB2019 paper: Operation Soft Cell - a worldwide campaign against telecommunication providers

Today we publish the VB2019 paper by Cybereason researchers Mor Levi, Amit Serper and Assaf Dahan on Operation Soft Cell, a targeted attack against telecom providers around the world.

VB2019 paper: A study of Machete cyber espionage operations in Latin America

At VB2019 in London a group of researchers from the Stratosphere Lab at the Czech Technical University in Prague presented a paper in which they analysed and dissected the cyber espionage activities of an APT group in Latin America through the…

VB2019 paper: The push from fiction for increased surveillance, and its impact on privacy

In a paper presented at VB2019 in London, researchers Miriam Cihodariu (Heimdal Security) and Andrei Bogdan Brad (Code4Romania) looked at how surveillance is represented in fiction and how these representations are shaping people's attitudes to…

VB2019 paper: Oops! It happened again!

At VB2019 in London industry veterans Righard Zwienenberg and Eddy Willems took a detailed look at the relationship between past and current cyber threats. Today, we publish both their paper and the recording of their presentation.

Job vacancy at VB: Security Evangelist

Virus Bulletin is recruiting for a person to be the public face of the company

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.