Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

11/21/2010
10:07 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Researchers: Be Wary Of New Trojan Attacks

A yet to be named developer has released a free software development kit for a new Trojan horse considered to be similar to the Zeus banking Trojan - prompting a warning from researchers at a German security firm.

A yet to be named developer has released a free software development kit for a new Trojan horse considered to be similar to the Zeus banking Trojan - prompting a warning from researchers at a German security firm.The Trojan is dubbed Ares, and is geared toward providing cyber-criminals a way to spread malware through infected Web sites (exactly more of what we don't need). From G Data security firm's announcement:

As Ares has so many potential variants, it can be used for almost any attack on any target. We believe one of the eventual uses will be to spread Trojans aimed at online banking users. Internet users need to protect themselves by making sure they have anti-malware solutions in place that monitor all HTTP traffic and can block dangerous websites before they are called up on work and personal computers."

With or without a new Trojan, users should be following that advice every day.

According to G Data, Ares is very familiar to the Zeus banking Trojan - which infected millions of users - in that its design is modular, and that means attackers can use the code in many different ways. I supposed it could also make it more difficult for anti-virus applications to quickly identify.

The Ares author, according to G Data, will be releasing an Ares software development kit soon:

Underlining the commerciality of modern malware, a software development kit for the Trojan is available for free to 'trustworthy developers' on condition that a license fee is paid to Ares' developer when modules are sold on to third parties. Other potential users can buy the development kit for up to US $6,000, although a 'starter pack' with reduced functionality can also be purchased for US $850. As is customary in the malware industry, payment is made via an anonymous online payment service - in this case WebMoney - so that neither the purchaser nor the vendor need reveal their true identity.

Hopefully Ares (named after the Greek god of war) won't live up to its name and fizzles. Regardless, attackers aren't sleeping, and neither are those engaged in the underground industry designed to support them.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-10737
PUBLISHED: 2020-05-27
A race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the hom...
CVE-2020-13622
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (assertion failure) because a property key query for a Proxy object returns unintended data.
CVE-2020-13623
PUBLISHED: 2020-05-27
JerryScript 2.2.0 allows attackers to cause a denial of service (stack consumption) via a proxy operation.
CVE-2020-13616
PUBLISHED: 2020-05-26
The boost ASIO wrapper in net/asio.cpp in Pichi before 1.3.0 lacks TLS hostname verification.
CVE-2020-13614
PUBLISHED: 2020-05-26
An issue was discovered in ssl.c in Axel before 2.17.8. The TLS implementation lacks hostname verification.