Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

6/26/2013
04:21 PM
50%
50%

Carberp Source Code Leak Likely To Spawn Malware Variants, Innovation

Source code for the Carberp Trojan has been leaked, creating a double-edged sword for security researchers

Source code for the Carberp Trojan is now in the open, sparking speculation that the cyberunderground may soon be swarming with spin-offs targeting your financial data.

"Any time we see a leak of this nature, it's a bit of a double-edged sword," says Ken Pickering, director of engineering at CORE Security. "It gives us unique insight into how malware writers are currently targeting end users, which is exceptionally useful. At the same time, it also elevates the overall 'cybercrime' community's level of sophistication, since it gives them another example of a fairly successful piece of malicious code."

"If it's rapidly distributed," he adds, "I think we've already seen a trend of Trojan clones being released, [so] I wouldn't expect Carberp to be any different."

In 2011, another piece of financial malware had its source code leaked on the Internet -- the infamous ZeuS Trojan. It is believed by security researchers that the source code was used as the foundation for the Citadel Trojan, which was at the center of a recent takedown operation launched by Microsoft, the FBI, and others.

The source code for SpyEye was also leaked in 2011. In May, a man accused of helping to develop and spread SpyEye was extradited to the U.S. to face hacking charges. According to authorities, between 2009 and 2011 Algerian national Hamza Bendelladj -- also known as 'Bx1' -- and others developed, marketed, and sold versions of SpyEye and its component parts on the Web and allowed cybercriminals to customize their purchases.

"When ranking financial malware in terms of capabilities, Carberp is among the leaders with Zeus, SpyEye, Citadel, and all the other major financial malware," says Etay Maor, fraud prevention solutions manager at Trusteer. "Carberp source code includes all the well-known MitB [man-in-the-browser] capabilities, such as HTML injection, VNC [virtual network computing], and different forms of grabbers. In addition, the code includes a bootkit, which helps the malware stay undetected and tough to remove.

"Regardless of the leak, malware code writers are always developing new capabilities and techniques," he adds. "This may affect the pricing of malware -- as there is major malware out there for free -- and, ultimately, we might see Carberp variant sellers; however, the competition between developers never stops. An example of such a competition is highlighted in cases where sophisticated malware knows how to remove other malware from infected devices, therefore, becoming the sole owners of the stolen data."

According to Peter Kruse of CSIS Security in Denmark, the package of leaked code includes the Carberp bootkit, along with other source codes for what seems to be the Stoned bootkit, Citadel, and Ursnif.

"We also found several text files containing apparently private chats and various usernames and passwords for several FTP servers," blogs Kruse, adding that -- as was the case with the leakage of the ZeuS source code -- this means cybercriminals "have every chance to modify and even add new features to the kit."

For researchers, there is the potential plus that the leak will allow them to get better insight into what black hat hackers are up to, says Sean Bodmer, chief researcher at CounterTack.

"Not only was the Carberp code revealed in that .rar, there was also a large amount of Russian banking application code for the BSS thick client, likely exfiltrated from that organization directly," he explains. "Additionally, there are many other source compilations from bootkit techniques to anti-AV modules, which quickly become a security researcher's goldmine."

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Brian Prince is a freelance writer for a number of IT security-focused publications. Prior to becoming a freelance reporter, he worked at eWEEK for five years covering not only security, but also a variety of other subjects in the tech industry. Before that, he worked as a ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
CVE-2020-6566
PUBLISHED: 2020-09-21
Insufficient policy enforcement in media in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2020-6567
PUBLISHED: 2020-09-21
Insufficient validation of untrusted input in command line handling in Google Chrome on Windows prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
CVE-2020-6568
PUBLISHED: 2020-09-21
Insufficient policy enforcement in intent handling in Google Chrome on Android prior to 85.0.4183.83 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.