Thursday, April 17, 2025
HomeMalwareOperation Overtrap - Hackers Attack Online Banking Users Via Bottle Exploit Kit...

Operation Overtrap – Hackers Attack Online Banking Users Via Bottle Exploit Kit & Banking Malware

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity experts at Trend Micro have recently found a new malicious campaign, through which threat actors can trap or infect its victims with its several sophisticated payloads.

This new malicious campaign is entitled as “Operation Overtrap,” and analysts have asserted that the attackers are using the three-pronged attack in this campaign. In this campaign, they are mainly targeting and stealing the banking credentials of the users from Japan.

Since April 2019 this malicious campaign, “Operation Overtrap” is active, and solely infecting Japanese users to steal their banking credentials.

- Advertisement - Google News

According to the Trend Micro report, the threat actors uses three attack vectors in this campaign to spread the following things to steal banking credentials:-

  • Bottle exploit kit
  • Cinobi banking trojan

Attack Vectors Used

The analysis report of Trend Micro claims the following attack vectors are used by the attackers to spread the infection:-

  • Spam emails are used with a phishing link that masked as a banking website.
  • Victims are asked to run a malicious executable downloaded from the linked phishing page that was sent via spam emails.
  • Threat actors deliver the malware through malvertising using a custom exploit.

Bottle Exploit Kit

Initially, this malicious, Bottle Exploit Kit (BottleEK) was observed by the security analysts on September 29, 2019; and they detected that the attackers delivered a new complex banking trojan, known as “Cinobi”, instead of dropping a clean file.

In this campaign to spread and push this “Bottle Exploit Kit”, the threat actors have used a malvertising campaign which is targeted at users from Japan only.

The attackers used the Bottle Exploit Kit (BottleEK) to deliver the “Cinobi” banking trojan by exploiting two security flaws, and here they are mentioned below:-

  • CVE-2018-15982: A Flash Player use after free vulnerability 
  • CVE-2018-8174: A VBScript remote code execution vulnerability

Cinobi Banking Trojan

The threat actors have used Cinobi banking trojan in this campaign, and the security researchers have affirmed that the banking tojan that is used in Operation Overtrap has two versions.

  • The first version of Cinobi offers a DLL library injection payload, and also has the ability to modify the web traffic as well.
  • The second version of Cinobi offers the ability to alter the accessed webpages using the web inject function. This second one carries all the skill that the first one offers, as well as it also has the ability to communicate over the Tor proxy with a command-and-control (C&C) server.

Mitigations

A variety of attack vectors are used to steal the banking credentials in this “Operation Overtrap” campaign by the attackers. That’s why the experts at Trend Micro have strongly recommended users and organisations to:- 

  • Embrace best security practices to defend themselves and their systems against such attacks.
  • IT teams in organizations must have a centralized information gathering system.
  • Organisations should train their employees to make them aware of such threats, and report any suspicious activities.
  • Organisations should regularly update their systems to prevent the attackers from taking advantage of any security holes.
  • Organisations must use enterprise-level security tools, and firewalls.

So, by following the above-mentioned mitigations an organisation or user could easily prevent the threat actors from exploiting any security holes; and secure their networks.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Managing Burnout in the SOC – What CISOs Can Do

The Security Operations Center (SOC) is the nerve center of modern cybersecurity, responsible for...

The Future of Cybersecurity Talent – Trends and Opportunities

The cybersecurity landscape is transforming rapidly, driven by evolving threats, technological advancements, and a...

Mobile Security – Emerging Risks in the BYOD Era

The rise of Bring Your Own Device (BYOD) policies has revolutionized workplace flexibility, enabling...

Model Context Protocol Flaw Allows Attackers to Compromise Victim Systems

A critical vulnerability in the widely adopted Model Context Protocol (MCP), an open standard...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Gamaredon’s PteroLNK VBScript Malware Infrastructure and TTPs Uncovered by Researchers

Researchers have unearthed details of the Pterodo malware family, notably the PteroLNK variant used...

Agent Tesla Malware Uses Multi-Stage Attacks with PowerShell Scripts

Researchers from Palo Alto Networks have uncovered a series of malicious spam campaigns leveraging...

Beware! Online PDF Converters Tricking Users into Installing Password-Stealing Malware

CloudSEK's Security Research team, a sophisticated cyberattack leveraging malicious online PDF converters has been...