Friday, July 19, 2024
EHA

Brazilian Banking Trojan Allows Attackers Hijack Victims Bank Account and Send Himself Victims Funds

Brazilian Banking Trojan Which Delivering under the name vm.png through Spam Email campaigns, allows attackers to Hijack victim devices and attackers send himself Victims Funds.

An old banking fraud toolkit first discovered by IBM Trusteer in January 2015 has reared its ugly head again, this time in the form of a trojan called Boleto which uses overlay technique to dupe consumers of their banking details and even money.

The user-friendly Trojan is available in the Brazilian black market and can be used by hackers with minimal technical skills but is almost as deadly as some of the popular tools like Trickbot or those offered by Zeus.

While the aforementioned tools use phishing attacks, Boleto uses malware sent through email attachments to install Java code using a JAR file.

Also Read : Sockbot Android Malware Found in Eight Apps on Google Play with 2.6 million Installations

How This  Banking Trojan works

Upon opening a malicious mail infected by the malware, the user is forced to install Java code using a JAR file.

The JAR file contains an executable VMware file called vprintproxy.exe(hidden under a png file) which is a legitimate file signed by VMware.

Using DLL hijacking techniques the malicious code is then stored in vmwarebase.dll, thus going under the scanner of an anti-virus or anti-malware scanner.

Malware Working Function

Once in, as most malware do, it waits and bides its time till the end user logs into his/her banking site.

Once logged in, the malware sends an SMS to the remote attacker and a pop-ups an authentic looking overlay screen on top the user’s browser.

  • Keylogger
  • Screenshots
  • Replacing current screen with a provided image
  • Changing current system cursor
  • Autorun registry persistence establishment
  • Shutting down system utilities (such as taskmgr, dwm, regedit etc.)
  • Invoking system reboot
  • File\dir deletion functions

The Malware Module Interconnection:

The purpose of the overlay is to distract the user while underneath the overlay, the attacker makes merry with the logged in user information and conduct transactions as his/her will usually involving transferring money, stealing information etc.

This Trojan Kill some unwanted Process such as taskmgr.exe,msconfig.exe, regedit.exe, ccleaner.exe / ccleaner64.exe, dwm.exe (for Windows 7 only) iexplore.exe,iexplore.exe,iexplore.exe, firefox.exe,chrome.exe, opera.exe, opera.exe,safari.exe, NetExpress50.exe AplicativoBradesco.exe

Due to its sheer brilliance, stopping this fraud would require in addition to updated signature patterns for an anti-malware scanner, detection of remote access tools, checking for out of the ordinary browser behaviors.

The end user has to be educated on how to deal with the threat with the onus lying on the banks also to educate and inform the users that should such overlays happen during a logged in session, to immediately log out and alert the relevant authorities.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles