Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

New Banking Trojan: A Nasty And Formidable Foe

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
Are_grits_groceries Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 07:56 AM
Original message
New Banking Trojan: A Nasty And Formidable Foe
Malware is getting more and more sophisticated. Bent on destruction, it is seemingly immune to modern weapons. One such Trojan horse program is very sophisticated and it keeps reinventing itself in its greedy quest to empty bank accounts.

The URLzone Trojan, which was recently discovered by Finjan Software, is highly advanced and proof positive that the bad guys are keeping up with technology as well as the good guys (if not being a step ahead, sad to say). This strain of malware rewrites bank pages; victims do not know that their accounts have been tampered with and emptied in many cases. Its interface is sophisticated and diabolical as it’s command-and-control feature allows the bad guys pre-set the percentage of the account balance they wish to clear out!

URLzone is a formidable adversary.. RSA researchers claim that this malware utilizes several techniques to discover those machines that have been set up by investigators and law enforcement, and so far, they have been impossible to fool. RSA Security was founded by and named after the inventors of public key cryptography: Ron Rivest, Adi Shamir and Leonard Adelman. According to Aviv Raff, RSA’s Fraud Action research lab manager:

“We typically create programs that are designed to mimic the behavior of real Trojans. When URLzone identifies one of these, it sends it bogus information. Security experts have long published research into the inner workings of malicious computer programs such as URLzone…Now the other side knows that they are being watched and they’re acting.”

(Ther is more at the link: http://amog.com/tech/banking-trojana-nasty-formidable-foe/

Bernie Madoff was a trojan horse.
Printer Friendly | Permalink |  | Top
KharmaTrain Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:11 AM
Response to Original message
1. The Next Level Of Warfare...
It will be fought on the cyber battlefield. I wouldn't be surprised if we learn this virus originated in some nation defense program of other government operated program...and not just the U.S...this is a hot new battlefront in Russia, China, Israel and many others...where the "best and brightest" are being hired to mole deep into computers or try to keep them out.

Banks have been notoriously slow and lax in staying ahead of the hackers and scammers. I recall 30 years ago seeing a geek buddy reroute bank transactions with his Radio Shack Trash-80 and a 300 baud (not kilobaud) modem. One can imagine how sophisticated this battlefield has become. When there's money and lots of it, there's always going to be someone who will want to try to take it...and economic and technical warfare is the next frontline...in many ways, the economic collapse of the past year is an end result.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:15 AM
Response to Original message
2. Seems to be specific to Windoze. nt
Printer Friendly | Permalink |  | Top
 
Commie Pinko Dirtbag Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:17 AM
Response to Reply #2
3. Aren't they all?
Linux user here. All the stability and security of a Mac (if not more), without hardware lock-in.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:27 AM
Response to Reply #3
4. Pragmatically, yeah, but you never know.
I run Ubuntu for that reason, and it's free and trouble-free too. But there is nothing theoretical that prevents a hacker from going after other OSes, it's just a lot more work, and a smaller target population, and so on. On the other hand, with the Unices you have access to the code. Macs I would guess lie somewhere in the middle.

But pragmatically, if you want to hack to make money, or to boost your shrivelled ego, why go after anything but Windoze, the easy target?
Printer Friendly | Permalink |  | Top
 
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:28 AM
Response to Reply #3
5. All KNOWN ones
Anything that connects to the outside world is vulnerable no matter which OS.

DesktopLinux.com: Central Command has discussed that it has seen numerous viruses, worms, and other malicious applications written to exploit vulnerabilities within Linux or Linux applications.Can you talk about the frequency of these reports -- are they increasing?

Keith Peer: We are seeing a growing interest by virus writers and virus writing groups to produce more Linux-based viruses, trojans and worms. While the relative number of Linux-based viruses is still small the initiative is there. On the Internet you can find Linux virus writing How-to's and Linux virus source code. Not too long ago Central Command's, Emergency Virus Response Team discovered the first cross compatible Windows/Linux virus named W32/Winux. This proof-of-concept virus demontrated that it is possible to build a virus that operates in both Windows and Linux and can infect executables in both operating systems. There is a growing resource list and tools to help existing and future virus writers to improve their work, sadly.
Printer Friendly | Permalink |  | Top
 
Greyhound Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:47 AM
Response to Reply #5
8. What that leaves out or ignores is what an app is capable of once insinuated.
Linux and all UNIX/UNIX based OS are inherently more secure than any M$ OS including 7.

As for web/internet based vulnerabilities, we see that once again not all browsers are equal and M$ consistently produces the least secure applications. The company's adamant refusal to adhere to even the most rudimentary protocols leaves their customers woefully vulnerable and their massive financial clout ensures that few of them are aware just how open their systems are.

Oh and BTW, this Central Command is not the US military Central Command (CentCom) as their name clearly implies.

MEDINA, Ohio -- Central Command, a leading provider of PC anti-virus software and computer security services, and its partners today announced the discovery of W32.Winux, the world's first cross platform virus capable of infecting computers using both the Microsoft Windows and Linux operating systems.



Printer Friendly | Permalink |  | Top
 
hobbit709 Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 09:15 AM
Response to Reply #8
9. Just keep on believing that
As I said-NO system that connects to the outside world is TOTALLY secure.

All one can do is take reasonable precautions, which is something most people don't.

I play on the hacker sites just to keep up with what is going on. I have at leat 5 computers up and running at any given time-using 3 variations of Windows and 3 distros of Linux. Hell I even have an old DOS machine that I use now and then just to keep my hand in.

I have had ONE infection in the last five years and that was because I trusted a disk someone gave me without scanning first. Took all of 3 minutes to clean.

But I make a living fixing people's computers that all had problems because of the Human 1.0 interface.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 09:25 AM
Response to Reply #9
11. I would still run DOS if I could get current drivers.
:hi:
Printer Friendly | Permalink |  | Top
 
Greyhound Donating Member (1000+ posts) Send PM | Profile | Ignore Mon Nov-30-09 01:37 AM
Response to Reply #9
13. Of course not and I never said it was. What you ignore, or just don't know, is that
every M$ OS is far more vulnerable (and inefficient, bloated, and just badly designed) than others. Further, the damage that an app can do is limited in sensible OSes because it cannot run rampant throughout the entire system.

As I said, Every UNIX based OS is inherently far more secure than windoze.

Human error is, of course, the number one cause of computer problems, but windoze is the world's most prevalent virus.


Printer Friendly | Permalink |  | Top
 
Greyhound Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:33 AM
Response to Reply #2
6. Of course it is, and what the Ma$$holes have done to browser protocols would
be criminal if M$ wasn't "too big to fail" and therefore above the law.

We were talking to companies about this very future 15 years ago, and because it cost some money, very few have done anything to prevent it. One client (bank with the initials BA) went so far as to fail to report a loss in the tens of millions to the Feds (as required by law) so they would not have to secure their systems or bear the publicity. It has only become worse since then.


Printer Friendly | Permalink |  | Top
 
Lagomorph Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 08:36 AM
Response to Reply #2
7. Where do you get that?
Edited on Sun Nov-29-09 08:38 AM by Lagomorph
It happens on servers and mainframes from what I can tell.

The only time my accounts were ever hacked, it was thru the bank, not my computer.
Printer Friendly | Permalink |  | Top
 
bemildred Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 09:24 AM
Response to Reply #7
10. The Finjan blog discusses/analyzes it here:
Edited on Sun Nov-29-09 09:27 AM by bemildred
http://www.finjan.com/MCRCblog.aspx?EntryId=2345

If you read through it, you will see that it uses various and many Windoze specific features, e.g. the Registry and drive C:.
Printer Friendly | Permalink |  | Top
 
L0oniX Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Nov-29-09 09:52 AM
Response to Original message
12. Exploder vuln ...use FireFox
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat Apr 20th 2024, 02:44 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC