Wednesday, July 24, 2024
EHA

Hackers Stole Banking Details From Over 50,000 Users Via Web Injections

Web injections involve injecting malicious code into websites to manipulate content or redirect users to fraudulent sites. 

Threat actors use this technique to steal sensitive information, such as:-

  • Login credentials
  • Financial data
  • Exploit vulnerabilities in web applications

Cybersecurity researchers at Security Intelligence recently identified that hackers hijacked the banking details of more than 50,000 users using web injection attacks.

Banking trojans use web injections to threaten the cyber world, and IBM Security Trusteer finds a sneaky JavaScript campaign in March 2023.

While in this malicious campaign, the malware’s link to DanaBot remains unconfirmed; however, Since 2023, more than 50000 user sessions got hit in over 40 banks across the following countries:-

  • North America
  • South America
  • Europe
  • Japan

Hackers Hijacked Banking Details

This new threat campaign aims to hijack popular banking apps, and the malicious domains bought in Dec 2022 have been active since early 2023.

Meanwhile, the JS script targets specific page structures and injects content when certain conditions are met. 

Besides this, the credential theft is done via added event listeners on the login button. It also focuses on common bank layouts, as the threat actors aim to compromise and monetize user banking info.

Malware starts grabbing data as soon as the script is fetched. It often uses the computer’s name to add details like bot ID and config flags as query parameters. 

This suggests an OS-level infection by other malware components before browser injection.

Initial obfuscated GET request fetching the script
Initial obfuscated GET request fetching the script (Source – Security Intelligence)

The encoded script is disguised and returned as a single line with an added decoy string. Meanwhile, the malicious content is hidden in network traffic, resembling a legitimate CDN

Injection avoids running if “adrum” is in the page URL, and the function patching removes malware evidence to hide its presence.

Dynamic script communicates with the C2 server and adjusts actions based on the following two key elements:-

  • Received instructions
  • Logs updates

Resilient injection patiently waits, retries steps, and adapts based on server responses. Continuous server-device identification ensures execution continuity. 

The script, within an anonymous function, configures with default values and adjusts dynamically during runtime. Asynchronous actions, triggered by server responses, hide the script. 

While the operational states dictate actions like:-

  • Injecting prompts
  • Executing login attempts
Prompting a phone number for two-factor authentication
Prompting a phone number for two-factor authentication (Source – Security Intelligence)

Recommendations

Here below, we have mentioned all the recommendations offered by the security analysts:-

  • Practice vigilance
  • Report suspicious activity
  • Avoid unknown software
  • Follow password and email security best practices
  • Always stay vigilant
  • Implement robust security
  • Stay informed to counter emerging threats
Website

Latest articles

ShadowRoot Ransomware Attacking Organizations With Weaponized PDF Documents

A rudimentary ransomware targets Turkish businesses through phishing emails with ".ru" domain sender addresses....

BreachForumsV1 Database Leaked: Private messages, Emails & IP Exposed

BreachForumsV1, a notorious online platform for facilitating illegal activities, has reportedly suffered a massive...

250 Million Hamster Kombat Players Targeted Via Android And Windows Malware

Despite having simple gameplay, the new Telegram clicker game Hamster Kombat has become very...

Beware Of Malicious Python Packages That Steal Users Sensitive Data

Malicious Python packages uploaded by "dsfsdfds" to PyPI infiltrated user systems by exfiltrating sensitive...

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into...

BlueStacks Emulator For Windows Flaw Exposes Millions Of Gamers To Attack

A significant vulnerability was discovered in BlueStacks, the world's fastest Android emulator and cloud...

Google Chrome 127 Released with a fix for 24 Security Vulnerabilities

Google has unveiled the latest version of its Chrome browser, Chrome 127, which is...
Tushar Subhra Dutta
Tushar Subhra Dutta
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles