Vulnerabilities / Threats
7/23/2013
12:38 PM
50%
50%

Russian Trojan With Twist Targets Financial Details

Malware, designed to not infect Russian or Ukrainian PCs, is already for sale on cybercrime underground, says RSA.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
For sale: State-of-the-art banking Trojan, just $5,000 via the WebMoney (WMZ) payment system.

So goes the sales pitch for "a new professional-grade banking Trojan" spotted by security firm RSA. Dubbed Kins, the software promises to fill a gap in the financial malware world left by the source code for the easy-to-use Zeus malware published in 2011, and Citadel -- which offered not only a range of features but also high-grade technical support -- withdrawn from sale in cybercrime marketplaces in December 2012.

"Underground chatter increasingly reflects the growing appetite for new, 'real' banking malware in the online fraud arena, featuring discussions by criminals who would eagerly welcome a new developer and jointly finance a banker project if one would only make sense to them," said RSA cyber intelligence researcher Limor Kessem in a Tuesday blog post.

[ Is telecom equipment maker Huawei engaged in espionage? Read Huawei Spies For China, Former NSA Director Says. ]

Enter Kins, which RSA said it first began hearing chatter about in February 2013. Earlier this month, meanwhile, "a vendor in a closed Russian-speaking online forum announced the open sale of the Trojan to the cybercrime community," said Kessem.

The related "software sale" bulletin, written in Russian, says the bot includes both a dropper and Zeus-compatible DLLs, which are used for malicious Web injections, to disguise the malware's manipulation of online banking accounts.

The developer behind Kins promised that the Trojan can infect a PC deep at the volume boot record (VBR) level, where it's harder for antivirus software to detect. The developer also said that the malware includes features designed to help it evade Trojan trackers, which have been used by security researchers to bring down numerous botnet command-and-control systems, including SpyEye.

The malware's developer advertised the base version of the Trojan for $5,000, but said additional modules are also for sale, including a plug-in for $2,000 that's designed to disable the financial malware defense tool Rapport. Kins' developers also promised technical support for all Windows 8 users and said they have "plans for further development," including a module that will scan infected PCs for the presence of software that uses the remote desktop protocol (RDP). If RDP is present, remote attackers would have an easy-to-use and hard-to-detect mechanism for gaining full remote control of an infected PC.

Who built Kins? Assuming the software is real, it appears to be built by Russian or Ukrainian criminals. "Kins does not work on Russian-language systems. If Russian or Ukrainian specs are detected, the Trojan will terminate," said Kessem. That suggests that Kins' developer is abiding a long-standing agreement between cybercriminals and authorities in both of those countries: If the criminals refrain from targeting locals and agree to provide occasional pro bono work to the country's security services, then government authorities turn a blind eye to their online crime campaigns -- or in this case, financial malware development efforts.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.