- Fully 61 percent of ASX100 exposed as email fraud gets personal
- Android bug bounty tops $3m in third year, but pay flattens out
- Newegg confirms credit card information was taken in a sophisticated attack
- Cisco’s Webex recording player riddled with bugs, so best to patch now
- Xbash: malware for ransoming Linux DBs and Windows crypto-mining
- 25 October 2010 10:08
Avalanche spam gang tap the power of ZeuS to boost cybercrime earnings
SYDNEY, October 25. Reports that the world's most prolific phishing gang has diversified its operations over from conventional phishing emails to distributing the ZeuS Trojan is another sign that hackers are becoming incredibly sophisticated, says Imperva, the data security specialist.
More than anything, the attack vectors used by the Avalanche botnet gang, who have taken two years to migrate to the new fraud architecture, indicate that criminal hackers are now using lateral thinking to develop their fraudulent modus operandi, says Amichai Shulman, Imperva's chief technology officer.
"What is apparent from our research is that the Avalanche cybercrime gang, who were reported to be responsible for two-thirds of the world's phishing attacks this time last year, are also using advanced programming techniques," he said.
Shulman added: “The problem is that the banks, nor the users, are realising that the client browser is actually under the control of the hacker. So although a user is in fact authenticated to the bank, all transactions are actually being performed from that moment on by the Trojan.”
He said Imperva's research teams concluded that using a man-in-the-browser attack, similarly to those uncovered in September, enables the electronic criminals to stage automated withdrawals. The problem of detecting this type of fraud is all the more difficult as banks are not aware that the transaction’s initiator is not the actual owner of the account, rather it is an automated process. "This is why some financial institutions now require users to confirm by mobile phone text message when a new account payee is set up," said Shulman.
"Until the banks are able to prevent against this type of complex malware-driven fraud, the cybercriminal gangs will continue to evolve their already sophisticated strategies to beat the banks - and their customers "
For more on the latest hacker e-banking fraud methodologies: http://bit.ly/9uCXWo
Imperva is the global leader in data security. With more than 1,200 direct customers and 25,000 cloud customers, Imperva’s customers include leading enterprises, government organisations, and managed service providers who rely on Imperva to prevent sensitive data theft from hackers and insiders. The award-winning Imperva SecureSphere is the only solution that delivers full activity monitoring for databases, applications and file systems. For more information, visit www.imperva.com, follow us on Twitter or visit our blog.
Media queries Grenadine Lau Imperva Phone: +65.6749 4482 Mobile: +65.9666 1886 Email: Grenadine.Lau@Imperva.com
David Frost PR Deadlines Pty Ltd, for Imperva Phone: +61.2.4341 5021 Mobile: +61 (0) 408 408 210 Email: firstname.lastname@example.org