{"id":684,"date":"2014-06-28T15:12:26","date_gmt":"2014-06-28T19:12:26","guid":{"rendered":"http:\/\/www.ccrepairservices.com\/blog\/?p=684"},"modified":"2014-06-28T15:32:49","modified_gmt":"2014-06-28T19:32:49","slug":"new-malware-new-banking-trojanwith-network-sniffer-spreading-on-the-internet-at-a-high-pace","status":"publish","type":"post","link":"https:\/\/www.ccrepairservices.com\/blog\/virus-and-malware-threats\/new-malware-new-banking-trojanwith-network-sniffer-spreading-on-the-internet-at-a-high-pace\/","title":{"rendered":"NEW MALWARE &#8211; New Banking trojanwith Network Sniffer Spreading on the Internet at a high pace"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/2.bp.blogspot.com\/-eq1pgjfxfZo\/U656wdAdJSI\/AAAAAAAAcNA\/14wFlrgFlkM\/s728\/Banking-Malware-Network-Sniffer.jpg\" alt=\"\" width=\"728\" height=\"485\" \/><\/p>\n<p>The hike in the banking malware this year is no doubt almost double compared to the previous one, and so in the techniques of malware authors.<\/p>\n<p>Until now, we have seen banking Trojans affecting the infected device and steal users\u2019 financial credentials in order to run them out of their money. But nowadays, malware authors are adopting more sophisticated techniques in an effort to target as many victims as they can.<\/p>\n<p><strong>BANKING MALWARE WITH NETWORK SNIFFING<\/strong><\/p>\n<p>Security researchers from the Anti-virus firm Trend Micro have discovered a new variant of banking malware that not only steal the users\u2019 information from the device it has infected but, <strong>has ability to \u201c<em>sniff<\/em>\u201d network activity <\/strong>to steal sensitive information of other network users as well.<\/p>\n<p>&nbsp;<\/p>\n<p>The banking malware, dubbed as <strong>EMOTET<\/strong> spreads rapidly through spammed emails that masquerade itself as a bank transfers and shipping invoices. The spammed email comes along with a link that users easily click, considering that the emails refer to financial transactions.<\/p>\n<p>Once clicked, the malware get installed into users\u2019 system that further downloads its component files, including a configuration and .DLL file. The configuration files contains information about the banks targeted by the malware, whereas the .DLL file is responsible for intercepting and logging outgoing network traffic.<\/p>\n<p>The .DLL file is injected to all processes of the system, including web browser and then \u201c<em>this malicious DLL compares the accessed site with the strings contained in the previously downloaded configuration file<\/em>, wrote <em>Joie Salvio,<\/em> security researcher at Trend Micro.<\/p>\n<p>\u201c<em>If strings match, the malware assembles the information by getting the URL accessed and the data sent.<\/em>\u201d<\/p>\n<p><strong>ENCRYPTED STOLEN DATA<\/strong><\/p>\n<p>Meanwhile, the malware stores stolen data in the separate entries after been encrypted, which means the malware can steal and save any information the attacker wants.<\/p>\n<p>&#8220;<em>The decision to storing files and data in registry entries could be seen as a method of evasion<\/em>&#8220;, Salvio said. &#8220;<em>Regular users often do not check registry entries for possibly malicious or suspicious activity, compared to checking for new or unusual files. It can also serve as a countermeasure against file-based AV detection for that same reason<\/em>.&#8221;<\/p>\n<p><strong>HTTPS CONNECTIONS\u00a0KICKED<\/strong><\/p>\n<p>Moreover, the malware also has capability to even bypass the secure HTTPs connection which poses more danger to users\u2019 personal information and banking credentials, as users will feel free to continue their online banking without even realizing that their information is being stolen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/4.bp.blogspot.com\/-qkBfIpuXYek\/U655hKOO9fI\/AAAAAAAAcM4\/lbE-FBAPvq4\/s728\/EMOTET-login.png\" alt=\"\" width=\"500\" height=\"410\" \/><\/p>\n<p>\u201c<em>[It has] capability to hook to the following Network APIs to monitor network traffic: PR_OpenTcpSocket PR_Write PR_Close PR_GetNameForIndentity Closesocket Connect Send WsaSend<\/em>\u201d<\/p>\n<p>This kind of financial threat is really dangerous for the people, because previous banking malwares often rely on form field insertion or phishing pages to steal users\u2019 financial information, but the use of network sniffing in the malware, makes the threat even more harder for users to detect any suspicious activity as no changes are visibly seen, said the researcher.<\/p>\n<p>Researchers are still investigating that how the gathered stolen data the malware sniffs from the network is being sent to the attacker.<\/p>\n<p>The malware infection is not targeted to any specific region or country but, EMOTET malware family is largely infecting the users of EMEA region, i.e. Europe, the Middle East and Africa, with Germany on the top of the affected countries.<\/p>\n<p>Users are advised to do not open or click on links and attachments provided in any suspicious email, but if the message is from your banking institution and of concern to you, then confirm it twice before proceeding.<\/p>\n<p>The hike in the banking malware this year is no doubt almost double compared to the previous one, and so in the techniques of malware authors.<\/p>\n<p>Until now, we have seen <strong>banking Trojans<\/strong> affecting the infected device and steal users\u2019 financial credentials in order to run them out of their money. But nowadays, malware authors are adopting more sophisticated techniques in an effort to target as many victims as they can.<\/p>\n<p><strong>BANKING MALWARE WITH NETWORK SNIFFING<\/strong><\/p>\n<p>Security researchers from the Anti-virus firm Trend Micro have discovered a new variant of banking malware that not only steal the users\u2019 information from the device it has infected but, <strong>has ability to \u201c<em>sniff<\/em>\u201d network activity <\/strong>to steal sensitive information of other network users as well.<\/p>\n<p>The banking malware, dubbed as <strong>EMOTET<\/strong> spreads rapidly through spammed emails that masquerade itself as a bank transfers and shipping invoices. The spammed email comes along with a link that users easily click, considering that the emails refer to financial transactions.<\/p>\n<p>Once clicked, the <strong>malware<\/strong> gets installed into users\u2019 system that further downloads its component files, including a configuration and .DLL file. The configuration files contains information about the banks targeted by the malware, whereas the .DLL file is responsible for intercepting and logging outgoing network traffic.<\/p>\n<p>The .DLL file is injected to all processes of the system, including web browser and then \u201c<em>this malicious DLL compares the accessed site with the strings contained in the previously downloaded configuration file<\/em>, wrote <em>Joie Salvio,<\/em> security researcher at Trend Micro. \u201c<em>If strings match, the malware assembles the information by getting the URL accessed and the data sent.<\/em>\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>ENCRYPTED STOLEN DATA<\/strong><\/p>\n<p>Meanwhile, the malware stores stolen data in the separate entries after been encrypted, which means the malware can steal and save any information the attacker wants.<\/p>\n<p>&#8220;<em>The decision to storing files and data in registry entries could be seen as a method of evasion<\/em>&#8220;, Salvio said. &#8220;<em>Regular users often do not check registry entries for possibly malicious or suspicious activity, compared to checking for new or unusual files. It can also serve as a countermeasure against file-based AV detection for that same reason<\/em>.&#8221;<\/p>\n<p><strong>HTTPS CONNECTIONS\u00a0KICKED<\/strong><\/p>\n<p>Moreover, the malware also has capability to even bypass the secure HTTPs connection which poses more danger to users\u2019 personal information and banking credentials, as users will feel free to continue their online banking without even realizing that their information is being stolen.<\/p>\n<p>\u201c<em>[It has] capability to hook to the following Network APIs to monitor network traffic: PR_OpenTcpSocket PR_Write PR_Close PR_GetNameForIndentity Closesocket Connect Send WsaSend<\/em>\u201d<\/p>\n<p>This kind of financial threat is really dangerous for the people, because previous banking malwares often rely on form field insertion or phishing pages to steal users\u2019 financial information, but the use of network sniffing in the malware, makes the threat even more harder for users to detect any suspicious activity as no changes are visibly seen, said the researcher.<\/p>\n<p>Researchers are still investigating that how the gathered stolen data the malware sniffs from the network is being sent to the attacker.<\/p>\n<p><strong>MALWARE DISTRIBUTION OVER WORLD MAP<\/strong><\/p>\n<p>The malware infection is not targeted to any specific region or country but, EMOTET malware family is largely infecting the users of EMEA region, i.e. Europe, the Middle East and Africa, with Germany on the top of the affected countries.<\/p>\n<p>Users are advised to do not open or click on links and attachments provided in any suspicious email, but if the message is from your banking institution and of concern to you, then confirm it twice before proceeding.<\/p>\n<p>&nbsp;<\/p>\n<h2 style=\"text-align: center;\"><span style=\"color: #00ff00;\">IF INFECTED Visit Our <a href=\"https:\/\/ccrepairservices.com\">Main Site OR call 754-234-5598<\/a><\/span><\/h2>\n<h1 style=\"text-align: center;\"><span style=\"color: #ff6600;\"> for latest computer repair and online news.<\/span><\/h1>\n<h2 style=\"text-align: center;\"><span style=\"color: #993300;\">Local and Online Virus removal and computer repairs anytime, anywhere<\/span><\/h2>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The hike in the banking malware this year is no doubt almost double compared to the previous one, and so in the techniques of malware authors. Until now, we have seen banking Trojans affecting the infected device and steal users\u2019 financial credentials in order to run them out of their money. But nowadays, malware authors are adopting more sophisticated techniques in an effort to target as many victims as they can. BANKING MALWARE WITH NETWORK SNIFFING Security researchers from the Anti-virus firm Trend Micro have discovered a new variant of banking malware that not only steal the users\u2019 information from the device it has infected but, has ability to \u201csniff\u201d network activity to steal sensitive information of other network users as well. &nbsp; The banking malware, dubbed as EMOTET spreads rapidly through spammed emails that masquerade itself as a bank transfers and shipping invoices. The spammed email comes along with a link that users easily click, considering that the emails refer to financial transactions. Once clicked, the malware get installed into users\u2019 system that further downloads its component files, including a configuration and .DLL file. The configuration files contains information about the banks targeted by the malware, whereas the .DLL [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[964,856,959,960,971,744,821,692,967,987,151,972,980,983,969,704,957,974,965,976,963,985,981,625,973,844,605,958,861,10,42,970,26,820,39,968,977,975,962,982,694,978,979,80,928,984,961,966,22,986,345,34],"class_list":["post-684","post","type-post","status-publish","format-standard","hentry","category-virus-and-malware-threats","tag-affordable-virus-removal","tag-bank","tag-bank-malware","tag-bank-virus","tag-boca-raton-virus-removal","tag-boynton-beach","tag-broward-computer-repair","tag-cheap-virus-removal","tag-computer-problems","tag-computer-repair-center","tag-computer-services","tag-coral-springs-virus-removal","tag-dade-computer-repair","tag-emergency-computer-repair","tag-find-a-tech","tag-free-antivirus","tag-free-downloads","tag-free-tools","tag-help-me-with-a-virus","tag-how-to-remove-a-virus","tag-inexpensive-virus-removal","tag-local-technicians","tag-low-price-virus-removal","tag-malware-removal","tag-miami-beach-virus-removal","tag-miami-virus-removal","tag-near-me","tag-new-banking-virus","tag-new-trojan","tag-new-virus","tag-online-services","tag-online-tech","tag-online-virus-removal","tag-palm-beach","tag-parkland","tag-pc-virus-help","tag-private-information","tag-repair-my-computer","tag-rootkit-removal","tag-same-day-computer-repair","tag-same-day-virus-removal","tag-secure-computer","tag-south-florida-computer-repairs","tag-spyware-removal","tag-top-rated-computer-services","tag-top-rated-virus-removal","tag-trojan-removal","tag-virus-problem","tag-virus-removal","tag-virus-removal-near","tag-virus-services","tag-weston"],"_links":{"self":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/comments?post=684"}],"version-history":[{"count":5,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/684\/revisions"}],"predecessor-version":[{"id":689,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/posts\/684\/revisions\/689"}],"wp:attachment":[{"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/media?parent=684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/categories?post=684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ccrepairservices.com\/blog\/wp-json\/wp\/v2\/tags?post=684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}