A new variant of the Citadel financial malware is targeting users of the Payza online payment platform by launching local in-browser attacks to steal their credentials, according to researchers from security firm Trusteer.
Citadel is a Trojan program designed primarily to steal online banking credentials, but is also associated with the Reveton ransomware, which locks down computers and displays rogue alerts claiming to come from law enforcement agencies.
Like most banking Trojan programs, Citadel's hooks into the browser process can modify Web pages opened on infected computers in real time. These rogue local website modifications are known as Man-in-the-Browser (MitB) attacks and are harder for victims to spot than regular phishing attacks because the URLs displayed in the browser address bar are those of legitimate websites.
The new Citadel variant discovered by Trusteer researchers contains MitB code that alters the form fields users are asked to fill in on Payza's log-in page. More specifically, the code adds an additional PIN (personal identification number) field to the authentication form.
"The Payza transaction PIN is used every time a user wants to send funds, add funds, withdraw funds or make a payment," Trusteer researcher Etay Maor said Tuesday in a blog post. "By obtaining the victim's email, password and PIN number, a cybercriminal can take over the account and commit fraudulent transactions."
Payza is an online payment platform similar to PayPal, but with a strong focus on emerging markets. London-based MH Pillars, the company that owns Payza, claims that the service is available in 197 countries and has over 9 million users.
Payza was launched in May 2012 as a redesigned version of AlertPay, a Canadian online payment platform acquired by MH Pillars. The new Citadel variant contains code targeting both https://secure.payza.com/login and https://www.alertpay.com URLs.
There are several security concerns with the use of online financial services like Payza in developing countries, Maor said. These stem from the wide use of public computers in locations such as Internet cafes and the generally low level of online security awareness, he said.
"Together, these conditions can have serious implications," Maor said. "Public computers are typically at higher risk for malware infections and when used by an unsuspecting user, the chances of a successful fraudulent transfer are much higher."
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.