Jump to content

Recommended Posts

  • ExTS Admin
Posted

Fraudsters attempt to trick victims into contacting them instead of their banks.

 

New configurations of the Shylock financial malware inject attacker-controlled phone numbers into the contact pages of online banking websites, according to security researchers from antivirus vendor Symantec.

 

By doing this, the attackers attempt to trick victims into calling them instead of the bank if they become suspicious during an online banking session, Symantec researcher Alan Neville said in a blog post on Tuesday.

 

Security researchers have advised users for years to call their banks in order to verify the authenticity of any unusual error messages or requests they encounter while performing online banking operations. This type of attack could defeat that basic defense.

 

"While the exact motive of the attackers is not clear, we speculate that it is either an attempt to extract sensitive login credentials from victims during a telephone conversation or an attempt to block victims from notifying their bank of a problem with their account, giving the attackers more time to perform activities," Neville said.

 

The new Shylock variant targets banks from the U.K., Neville said. "The numbers being used by the attacker are easy to create online and are disposable."

 

The Shylock malware, named after a character from Shakespeare's The Merchant of Venice, was first discovered in September 2011 and its main purpose is to steal online banking credentials and other financial information.

 

Like most financial Trojan programs, Shylock is capable of injecting rogue content into websites accessed from infected computers. The injected content is customized for every targeted website and is pulled from a configuration file.

 

Shylock attackers are known for being creative with their scams. Back in February, researchers from security vendor Trusteer reported that a Shylock variant was modifying online banking websites to inform users that their computers couldn't be identified and they needed to speak with a bank representative in order to verify their account information.

 

The malware then injected a Web chat window into the browsing session, connecting targeted users with the attackers instead of their bank's employees.

 

 

Source:

http://www.networkworld.com/news/2012/080812-shylock-malware-injects-rogue-phone-261494.html?source=nww_rss

Member of:

UNITE

  • Replies 0
  • Created
  • Last Reply

Top Posters In This Topic

Popular Days

Top Posters In This Topic

Popular Days

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...