Threat Intelligence
11/16/2017
02:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Terdot Banking Trojan Spies on Email, Social Media

Terdot Banking Trojan, inspired by Zeus, can eavesdrop and modify traffic on social media and email in addition to snatching data.

When is a banking Trojan more than a banking Trojan? When it can be used for cyberespionage.

Terdot, discovered by researchers at Bitdefender, can be used to view and modify traffic on email and social media platforms in addition to collecting victims' financial information. It can also steal credentials, inject HTML code on visited Web pages, and download and execute files.

The malware derives inspiration from the 2011 source code leak of the Zeus banking Trojan. It's not uncommon for banking Trojans to share similarities, however, and Zeus isn't the first to have its code made public. This has also happened with the Mirai, KINS, and Carberp malware families.

Bitdefender first spotted Terdot in October 2016, says senior e-threat analyst Bogdan "Bob" Botezatu. It performs the main functionalities of a banking Trojan: Terdot arrives in a malicious email with a button disguised as a PDF link. When clicked, it infects a machine and creates a Web proxy to modify transactions. Any data that victims send to a bank is intercepted by Terdot and modified in real-time, and the malware intercepts and modifies the bank's response.

The malware packs capabilities enabling hackers to collect far more than financial data. Because it lives in the browser, Terdot has unrestricted access to whatever is posted via that browser.

"The Web proxy is also instructed to steal sensitive information from the computer," says Botezatu. "It's not going after money; it harvests cookies from logged-in sessions and credentials for email accounts and social network accounts."

Terdot uses a chain of droppers, injections, and downloaders to protect the payload. It can bypass restrictions imposed by TLS by generating its own Certificate Authority and creating certificates for every domain visited in a man-in-the-middle attack. By injecting itself into the browser process, it can monitor activity and inject spyware.

Targeted regions include the US, Canada, the UK, Germany, and Australia. Frequently hit websites include Canada's PCFinancial, Desjardins, BMO, Royal Bank, Scotiabank, and CIBC. Affected email providers include Microsoft's live.com, Yahoo Mail, and Gmail; social media platforms Facebook, Twitter, Google Plus, and YouTube.

Terdot is specifically instructed not to collect data from Russian social media platform VK, which suggests Eastern European actors may be behind it.

Detection and Defense

Botezatu says Terdot poses a significant risk to businesses because of the way it's delivered and the damage a Trojan could inflict. However, its social media interception module adds a consumer spin to the malware.

"I don't think the guys in accounting would spend too much time on Facebook," he notes.

Terdot is extremely difficult to detect and remove, he continues. "It has modules that ensure persistence. It injects itself into every process on that machine, and these processes act like a watchdog to one another."

Because Terdot uses both phishing and man-in-the-middle to attack, businesses with breach prediction systems to cover all attack vectors are better prepared to defend themselves, says Manoj Asnani, vice president of product and design at Balbix.

"It should be noted that most of today's detection solutions are single attack vector-focused," he says. "A multi-vector system is needed in this case - and would have proactively flagged users that are at risk of phishing, in addition to compromised or spoofed certificates."

Unexpected Trend

This discovery is part of a growing trend of malware targeting financial institutions.

"We have started to see the reemergence of banker Trojans," he explains, adding that they had previously experienced a heyday between 2012 and 2016. "But we could have sworn the trend was otherwise."

It's curious to see banking Trojans resurface because they require several players and are difficult to launch and monetize, unlike comparatively easy attacks like ransomware. Botezatu blames their return on earlier Trojan code leaks and oversaturation of the ransomware market.

To this point, researchers at Trend Micro recently discovered a new iteration of banking malware Emotet with a few changes to its original behavior. This version of Emotet has been updated to evade detection and analysis; for example, it swapped its RunPE dropper for a Windows API to make it harder to find. Another anti-analysis tactic is checking when the scanner monitors activities to evade detection. It can also detect when it's inside a sandbox.

Related Content:

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance & Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
5 Reasons the Cybersecurity Labor Shortfall Won't End Soon
Steve Morgan, Founder & CEO, Cybersecurity Ventures,  12/11/2017
BlueBorne Attack Highlights Flaws in Linux, IoT Security
Kelly Sheridan, Associate Editor, Dark Reading,  12/14/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security: 2017
A look at the biggest news stories (so far) of 2017 that shaped the cybersecurity landscape -- from Russian hacking, ransomware's coming-out party, and voting machine vulnerabilities to the massive data breach of credit-monitoring firm Equifax.
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.