Vulnerabilities / Threats
7/23/2013
12:38 PM
50%
50%

Russian Trojan With Twist Targets Financial Details

Malware, designed to not infect Russian or Ukrainian PCs, is already for sale on cybercrime underground, says RSA.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
For sale: State-of-the-art banking Trojan, just $5,000 via the WebMoney (WMZ) payment system.

So goes the sales pitch for "a new professional-grade banking Trojan" spotted by security firm RSA. Dubbed Kins, the software promises to fill a gap in the financial malware world left by the source code for the easy-to-use Zeus malware published in 2011, and Citadel -- which offered not only a range of features but also high-grade technical support -- withdrawn from sale in cybercrime marketplaces in December 2012.

"Underground chatter increasingly reflects the growing appetite for new, 'real' banking malware in the online fraud arena, featuring discussions by criminals who would eagerly welcome a new developer and jointly finance a banker project if one would only make sense to them," said RSA cyber intelligence researcher Limor Kessem in a Tuesday blog post.

[ Is telecom equipment maker Huawei engaged in espionage? Read Huawei Spies For China, Former NSA Director Says. ]

Enter Kins, which RSA said it first began hearing chatter about in February 2013. Earlier this month, meanwhile, "a vendor in a closed Russian-speaking online forum announced the open sale of the Trojan to the cybercrime community," said Kessem.

The related "software sale" bulletin, written in Russian, says the bot includes both a dropper and Zeus-compatible DLLs, which are used for malicious Web injections, to disguise the malware's manipulation of online banking accounts.

The developer behind Kins promised that the Trojan can infect a PC deep at the volume boot record (VBR) level, where it's harder for antivirus software to detect. The developer also said that the malware includes features designed to help it evade Trojan trackers, which have been used by security researchers to bring down numerous botnet command-and-control systems, including SpyEye.

The malware's developer advertised the base version of the Trojan for $5,000, but said additional modules are also for sale, including a plug-in for $2,000 that's designed to disable the financial malware defense tool Rapport. Kins' developers also promised technical support for all Windows 8 users and said they have "plans for further development," including a module that will scan infected PCs for the presence of software that uses the remote desktop protocol (RDP). If RDP is present, remote attackers would have an easy-to-use and hard-to-detect mechanism for gaining full remote control of an infected PC.

Who built Kins? Assuming the software is real, it appears to be built by Russian or Ukrainian criminals. "Kins does not work on Russian-language systems. If Russian or Ukrainian specs are detected, the Trojan will terminate," said Kessem. That suggests that Kins' developer is abiding a long-standing agreement between cybercriminals and authorities in both of those countries: If the criminals refrain from targeting locals and agree to provide occasional pro bono work to the country's security services, then government authorities turn a blind eye to their online crime campaigns -- or in this case, financial malware development efforts.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4807
Published: 2014-11-22
Sterling Order Management in IBM Sterling Selling and Fulfillment Suite 9.3.0 before FP8 allows remote authenticated users to cause a denial of service (CPU consumption) via a '\0' character.

CVE-2014-6183
Published: 2014-11-22
IBM Security Network Protection 5.1 before 5.1.0.0 FP13, 5.1.1 before 5.1.1.0 FP8, 5.1.2 before 5.1.2.0 FP9, 5.1.2.1 before FP5, 5.2 before 5.2.0.0 FP5, and 5.3 before 5.3.0.0 FP1 on XGS devices allows remote authenticated users to execute arbitrary commands via unspecified vectors.

CVE-2014-8626
Published: 2014-11-22
Stack-based buffer overflow in the date_from_ISO8601 function in ext/xmlrpc/libxmlrpc/xmlrpc.c in PHP before 5.2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by including a timezone field in a date, leading to improper XML-RPC encoding...

CVE-2014-8710
Published: 2014-11-22
The decompress_sigcomp_message function in epan/sigcomp-udvm.c in the SigComp UDVM dissector in Wireshark 1.10.x before 1.10.11 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted packet.

CVE-2014-8711
Published: 2014-11-22
Multiple integer overflows in epan/dissectors/packet-amqp.c in the AMQP dissector in Wireshark 1.10.x before 1.10.11 and 1.12.x before 1.12.2 allow remote attackers to cause a denial of service (application crash) via a crafted amqp_0_10 PDU in a packet.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?