Vulnerabilities / Threats
2/22/2011
02:13 PM
50%
50%

OddJob, Zeus Mitmo Trojans Target Financial Data

The malware aims for bank accounts and financial details, warn security researchers at Trusteer and F-Secure.

Top 10 Security Stories Of 2010
(click image for larger view)
Slideshow: Top 10 Security Stories Of 2010

Hide your bank account details, as two new pieces of banking malware are making the rounds: the OddJob Trojan, which keeps banking sessions open after users log out, as well as a variant of Zeus Mitmo that targets Symbian and BlackBerry smartphones.

On Tuesday, browser security firm Trusteer warned that the OddJob malware could keep banking Web site sessions open even after users thought they'd logged off. "By tapping the session ID token -- which banks use to identify a user's online banking session -- the fraudsters can electronically impersonate the legitimate user and complete a range of banking operations," according to a blog post from Amit Klein, CTO of security firm Trusteer.

Trusteer discovered OddJob several months ago, but withheld disclosing details until law enforcement agencies concluded related investigations. It said that the malware has targeted customers in the United States, Poland, and Denmark, and appeared to be the work of criminals based in eastern Europe.

Interestingly, rather than writing its configuration to disk -- which might trip security software alarms -- OddJob fetches a new configuration from the cloud, by querying its command-and-control server every time a user opens a new browser session. These sessions can be tracked by criminals in real time, allowing them to select which ones they'd like to hijack.

Expect OddJob to evolve. "The most interesting aspect of this malware is that it appears to be a work in progress, as we have seen differences in hooked functions in recent days and weeks, as well as the way the command-and-control protocols operate," said Klein.

Meanwhile, the other new piece of financial malware is a Zeus Mitmo variant that targets Polish banking customers. According to a blog post from Sean Sullivan, a security advisor at antivirus and security firm F-Secure, the variant "is targeting the mobile-phone-based, two-factor authentication used by ING Bank Slaski," which is ING Bank in Poland. He said this Mitmo variant resembles one seen in September 2010 that targeted Spanish banking customers.

"Computers infected with a ZeuS Mitmo Trojan will inject a 'security notification' into the Web banking process, attempting to lure the user into providing their phone number," said Sullivan. "If a phone number is provided, the user will receive an SMS link pointing to the mobile component, ZeusMitmo.A." Clicking on the link then presents Symbian and BlackBerry users with Zeus Mitmo malware tailored to their smartphone.

The goal of Zeus Mitmo is to create fraudulent transactions using the mobile device, while subverting the bank's security procedures. In particular, the malware's mobile component creates a man-in-the-middle attack that steals the one-time password that some banks send via SMS to authorize a financial transaction, which are also known as mobile transaction authentication numbers (mTANs). By hijacking this security verification process, Zeus Mitmo disguises its fraudulent activities from users.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9676
Published: 2015-02-27
The seg_write_packet function in libavformat/segment.c in ffmpeg 2.1.4 and earlier does not free the correct memory location, which allows remote attackers to cause a denial of service ("invalid memory handler") and possibly execute arbitrary code via a crafted video that triggers a use after free.

CVE-2014-9682
Published: 2015-02-27
The dns-sync module before 0.1.1 for node.js allows context-dependent attackers to execute arbitrary commands via shell metacharacters in the first argument to the resolve API function.

CVE-2015-0655
Published: 2015-02-27
Cross-site scripting (XSS) vulnerability in Unified Web Interaction Manager in Cisco Unified Web and E-Mail Interaction Manager allows remote attackers to inject arbitrary web script or HTML via vectors related to a POST request, aka Bug ID CSCus74184.

CVE-2015-0884
Published: 2015-02-27
Unquoted Windows search path vulnerability in Toshiba Bluetooth Stack for Windows before 9.10.32(T) and Service Station before 2.2.14 allows local users to gain privileges via a Trojan horse application with a name composed of an initial substring of a path that contains a space character.

CVE-2015-0885
Published: 2015-02-27
checkpw 1.02 and earlier allows remote attackers to cause a denial of service (infinite loop) via a -- (dash dash) in a username.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.