19 February 2018
visit www.nextgenbanking.co.uk/

Trusteer warns on two-headed Trojan attacks on online banks

28 October 2009  |  1787 views  |  0 Source: Trusteer

Trusteer, the customer protection company for online businesses, today issued a security advisory on a new Trojan called W32.Silon that bypasses security tokens, banking card readers and uses a two pronged payload to steal login information and commit online financial fraud.

The Trusteer Rapport browser security service has blocked repeated attempts in-the-wild by the W32.Silon Trojan to compromise consumer Internet banking accounts. Findings gathered from a sample of the new malware are available in a report that explains its functionality, as well as how to detect and remove W32.Silon. The report is available at trusteer.com/webform/w32silon-malware-analysis.

W32.Silon is a new malware variant that intercepts Internet Explorer web browser sessions, and has been associated with fraud incidents at several large banks. Trusteer retrieved and analyzed a sample of this two headed Trojan, which is designed to steal generic login information and commit bank-specific fraud.

To steal user credentials, W32.Silon performs its initial attack when a user initiates a web login session and enters their username and password. The malware intercepts the login POST request, encrypts the requested data, and sends it to a command & control (C&C) server.

When it targets users of online banking applications that are protected by transaction authentication devices such as tokens or banking card readers, W32.Silon waits until the user has logged on and then injects dynamic html code into the login flow between the user and the bank's web server. First, the malware presents authentic looking web pages that appear to be from the bank asking the user to employ their transaction authentication device. Next, the user is asked to enter information from the device into the webpage. This information is then used by the criminals to execute fraudulent transactions on behalf of the user.

"This new Trojan illustrates how advanced malware writers have become in their ability to dynamically execute multiple, bank-specific attacks with a single piece of software," said Amit Klein, CTO and chief researcher at Trusteer. "The level of sophistication built-into W32.Silon is concerning, as is its focus on circumventing strong authentication systems like card and PIN readers. We have put all of our banking customers on alert, and are attempting to get the word out with this advisory."

Comments: (0)

Comment on this story (membership required)

Related company news


Related blogs

Create a blog about this story (membership required)
visit www.ebaday.comVisit www.vasco.comvisit www.swift.com/your-needs/instant-payments

Top topics

Most viewed Most shared
Saudi central bank provides sandbox for banks to try out Ripple techSaudi central bank provides sandbox for ba...
11510 views comments | 16 tweets | 12 linkedin
ABN Amro moves escrow accounts to the blockchainABN Amro moves escrow accounts to the bloc...
9068 views comments | 15 tweets | 13 linkedin
ECB launches staunch defence of cashECB launches staunch defence of cash
8925 views 10 comments | 22 tweets | 26 linkedin
Aussie real-time payments platform goes liveAussie real-time payments platform goes li...
8817 views comments | 15 tweets | 43 linkedin
Coinbase and Visa at loggerheads over erroneous charges on customer crypto accountsCoinbase and Visa at loggerheads over erro...
7461 views comments | 12 tweets | 10 linkedin

Featured job

Find your next job