Banker Trojan Bypasses SSL Mechanism

  • 16 June 2014
  • 1 reply
  • 2 views

Userlevel 7
Badge +54
June 16th, 2014, 17:27 GMT · By Ionut Ilascu
 


 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
Financial credentials are sent to the attacker in plain text
 
Security researchers appear to have bumped into a new remote access Trojan that manages to view encrypted traffic in plain text by routing the connection through the attacker’s domains.

Naming it Dyre or Dyreza, security researchers point out that the Trojan relies on browser hooking to intercept traffic and direct it to a command and control center owned by the attackers.

By using this technique, the victim is unaware that information is siphoned out to the cybercriminals and the session continues to appear as run through HTTPS.

Security researcher Ronnie Tokazowski from PhishMe says that as soon as the threat reaches the victim’s computer, it initiates communication with several IP addresses and when the conversation is established, it makes a request for a path to “/publickey/”, whose purpose is at the moment shrouded in mistery; then uses the GET request to receive the details about the operating system and what may be a command from the server.
 
Full Article

1 reply

Userlevel 7
 
By Jeremy Kirk | IDG News Service / June 17, 2014 Security researchers said they've spotted a new type of banking malware that rivals the capabilities of the infamous Zeus malware.
The malware, which is being called "Dyreza" or "Dyre," uses a man-in-the-middle attack that lets the hackers intercept unencrypted web traffic while users mistakenly think they have a secure connection with their online banking site.
Although Dyreza has similarities with Zeus, "we believe this is a new banker trojan family and not yet another offspring from the Zeus source code," according to a writeup by CSIS, a Danish security company.
 
InfoWorld/ full read here/ http://www.infoworld.com/d/security/new-powerful-dyreza-banking-malware-emerges-244440

Reply