Windoze users & Banks Warned again! Accounts to be EMPTIED by SPYEYE Hackers!

uncleyap

Alfrescian
Loyal
Joined
Jul 11, 2008
Messages
5,769
Points
48
http://news.google.com/news/more?hl...sult&ct=more-results&resnum=1&ved=0CCwQqgIwAA

[h=2]Malware can empty out your bank a/c[/h] Times of India - ‎11 hours ago‎
LONDON: Doing online banking frequently? Beware, as cyber-criminals have launched a new malware that not just steals your money from your bank, but also offers false reassurance that it's still there, experts have warned. The attack, a new version of ...



[h=2]How to hide the fact you've just robbed a bank online[/h] DaniWeb (blog) - ‎54 minutes ago‎
by Davey Winder on Jan 9th, 2012, 7:08 am Man-in-the-Middle (MITM) attacks are, sadly, not news these days; they are a fact of online life. But word of how the latest SpyEye Trojan-driven MITM attacks are using clever post transaction fraud systems to ...



All 2 related articles »



http://www.net-security.org/malware_news.php?id=1951

[h=1]SpyEye Trojan post transaction fraud schemes attack banks[/h]

Posted on 04.01.2012

trojan2.jpg
Many of us tend to spend a little more than we intend during the holiday season and, with all the transactions hitting our accounts, it can be hard to keep track. During the final few weeks of 2011, Trusteer saw fraudsters take advantage of this trend with their latest fraud scheme.

Historically we’ve typically seen man-in-the-browser attacks take place at one of the three possible online banking phases:
  • During the ‘login’ phase - designed to capture login credentials
  • At the ‘post login’ phase – with Webinjects used to social engineer, i.e. ‘trick’, the victim into providing personal information or downloading malware
  • At the transaction phase - tampering with transactions on-the-fly in the background, typically changing payee details and/or the amount.
“There is another, less discussed, form of man-in-the-browser attack – the post transaction attack,” said Amit Klein Trusteer’s CTO. “Post transaction attacks, as the name implies, occur after the evil deed has already been done and the account holder has closed the online banking session. These are designed to conceal illegitimate activity for as long as possible to either allow money to transfer to its final destination – uninterrupted, or continue to control the account and perform further transactions.”

Last year Trusteer noticed a Zeus configuration which targeted some major UK banks using an interesting injection into popular web-mail systems. At that time, this configuration aimed to hide email messages with specific text phrases it considered to be money transfer or payment confirmation emails.

Just before the recent holiday season, Trusteer came across a SpyEye configuration which attacks banks in the USA and UK. Instead of intercepting, or diverting, email messages the attack automatically manipulates the bank account transaction webpage the customer views.

The attack unfolds over through three major steps:
  • First a man-in-the-browser attack is launched on an online banking session and debit card data is captured
  • Then the debit card data is used to commit fraud
  • The next time the customer logs into their online banking site a post transaction attack is launched that hides fraudulent transactions from the victim.
Malware post-transaction attack in detail

Step 1: Malware post-login attack - credentials stolen

a. Fraudsters infect the victim’s machine with Man in the Browser malware (any MitB malware, e.g. Zeus, SpyEye, Carberp), with a suitable configuration.

b. The malware is configured to ask the customer for debit card data during the login phase (HTML injection) – e.g. card number, CVV2, expiration month and year, etc.

Step 2: Fraudster commits fraudulent activity

c. With the customer’s debit card details, the cybercriminals then commit card-not-present transaction fraud by making a purchase or transferring money over the telephone or the internet.

d. The fraudsters immediately feed the fraudulent transaction details to the malware control panel.

Step 3: Malware post-transaction attack with fraud hidden from view

e. The next time the victim visits their online banking site, the malware hides (“replaces”) the fraudulent transactions in the “view transactions” page, as well as artificially changing the total fraudulent transaction amount to balance the totals. As a result, the deceived customer has no idea that their account has been ‘taken over’, nor that any fraudulent transactions have taken place

Of course, if the victim still receives statements through the mail, the transactions will eventually be detected. However, with many customers encouraged to ‘go paperless’, it could take many months before the fraudulent activity is identified.

Amit Klein, Trusteer's CTO said, “I predict that the use of post transaction attack technology will significantly increase as it enables criminals to maximise the amount of fraud they can commit using their initial investment in malware toolkits and infection mechanisms with little additional effort as it is cheap to buy and easy to use.”


<center>
news-divider-grey.gif



</center>
 
http://news.google.com/news/more?hl...sult&ct=more-results&resnum=2&ved=0CDIQqgIwAQ

[h=2]Cyber criminals use your debit card details to drain your account[/h] Daily Mail - ‎Jan 6, 2012‎
By Rob Waugh The new SpyEye 'trojan horse' software steals your card details - then when you log into your online bank, it adjusts your balance so you don't realise anything is wrong. It's already been found in the US and the UK A new version of the ...



[h=2]New virus raids your bank account - but you won't notice[/h] msnbc.com - ‎Jan 6, 2012‎
Corporate sneakiness. Government waste. Technology run amok. Outright scams. Our effort to unmask these 21st Century headaches and offer solutions that save you time and money. The best way to protect yourself from an online financial scam is to ...



[h=2]New PC Virus Drains Your Account Creating Fake Bank Statements[/h] JotZoom - ‎Jan 7, 2012‎
It seems that protecting your online transactions becomes more and more difficult as the cybernetic world is progressing and new improved 'trojan horse' viruses are being launched. Apparently now a new PC virus launched can drain your account and you ...



[h=2]Cyber virus targeting online bank info[/h] MYfoxLUBBOCK.COM - ‎Jan 6, 2012‎
A new cyber bug is attacking consumers who bank online. The virus is not only stealing money, but also creating fake online bank statements. The virus is called SpyEye Trojan Horse. It reportedly steals customer passwords and adjusts balances, ...



[h=2]New virus threatens your bank account[/h] Beaufort Observer - ‎Jan 6, 2012‎
MSNBC's The Red Tape Chronicles has posted an article that should be of interest to anyone who uses online banking. It is a story about a computer virus that not only steals your bank account information, but covers it up to make it harder for you to ...



[h=2]Experts warn of computer virus which steals bank account information[/h] KMOV.com - ‎Jan 6, 2012‎
(KMOV) – A computer virus is infiltrating several online bank accounts and stealing money without the person even knowing it may be happening. The virus works as a fake web page so the person thinks it they are looking at their actual account. ...



[h=2]New 'SpyEye Trojan' Banking Virus Steals Your Money, Hides Fraudulent Transactions[/h] The Inquisitr - ‎Jan 6, 2012‎
While checking your bank account from your computer has become a generally accepted means of banking a security firm in Israel is now warning customers that such actions could drain their bank accounts. According to the firm a new virus known as the ...



[h=2]New Virus Hacks Your Bank Account, Covers Tracks[/h] Newser - ‎Jan 6, 2012‎
By Kevin Spak, Newser Staff (Newser) – For years, checking your bank account balance regularly online has been a pretty good way to guard against fraud—until now. An Israeli security firm has identified a new virus that not only steals the info ...



[h=2]Your bank account is under attack from new virus[/h] The Economic Voice - ‎Jan 6, 2012‎
Up until now a quick look at your online balance and previous transactions would probably have been enough to alert you to possible hacker fraud. But this may not be enough with the next generation of bank account hacking viruses. ...



[h=2]New virus can rob your bank account without you noticing[/h] KING5.com - ‎Jan 6, 2012‎
by KING 5 News SEATTLE – An elaborate new computer virus threatens to let hackers take money from your bank account while covering their tracks, preventing account holders from knowing they've been victimized. MSNBC.com reports the virus swaps out ...



All 11 related articles »




http://tw.news.yahoo.com/新電腦病毒-偷銀行存款不留紀錄-203244010.html


[h=1]新電腦病毒 偷銀行存款不留紀錄[/h]<cite class="byline vcard">自由時報 – <abbr title="2012-01-09T11:22:40+00:00">2012年1月9日 下午7:22</abbr></cite>

[h=3]相關內容[/h]




〔國際新聞中心/綜合報導〕繼數千名以色列民眾的信用卡資料被駭客公布在網路上後,以色列網路安全公司Trusteer發現一種新型電腦病毒,不僅能協助詐騙分子竊取銀行帳戶裡的錢,還可隱匿詐騙紀錄,避免帳戶持有者注意到存款已不翼而飛。以色列當局表示,將把網路攻擊視同暴力恐怖攻擊來處理。
據報導,新版SpyEye木馬程式可入侵銀行網頁,並以精密手法湮滅證據。首先,病毒守株待兔,等客戶透過中毒電腦造訪網路銀行後,再盜取其登入憑 證,誘騙客戶洩漏轉帳卡號資訊等其他個資。然後,詐騙者利用竊取的轉帳卡號消費後,病毒會攔截任何人進入受害者的銀行頁面,並將詐騙相關的交易紀錄抹除。 此舉能防止或至少延遲客戶發現詐騙事件,並回報銀行,讓詐騙分子獲得關鍵的額外時間,及時完成犯案。
至於堪稱以色列歷來數一數二嚴重的信用卡資料被盜事件,以色列當局表示,將把網路攻擊視同暴力恐怖攻擊來處理。據報導,一名宣稱來自沙烏地阿拉伯的 駭客OxOmar於五日宣稱犯案。信用卡公司透露,至少有六千張有效卡片資料流出。報導指出,OxOmar可能是住在墨西哥的一名十九歲駭客。
 
Don't worry too much, my login account with POSB, the bestest, safest (sic!) and I have the most $20.:D
 
Cyber KOOL-GANG (箍颈) of 21 century

In SG during 70s our fear of financial security were mainly street robberies. Mostly known as KOOL-GANG (箍颈) in Cantonese dialect.

0602_00405_001b3.jpg


Today's problem is another version = CYBER KOOL-GANG (箍颈)! :eek::*::D
 
Back
Top