SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Mish's Global Economic Trend Analysis

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
From: John McCarthy10/31/2008 10:21:40 PM
  Read Replies (1) of 116555
 
Stealthy Trojan Swipes Bank Log-ins, Financial Data From Thousands
By Brian Prince
2008-10-31

Article Views: 10308
Article Rating: / 15

RSA FraudAction Research Lab reported finding a treasure trove of financial data stolen by the Sinowal Trojan. The Trojan uses rootkit functionality to infect a PC's master boot record, allowing it to slip by malware defenses.

The Trojan has stolen roughly 300,000 bank log-ins, as well as a similar number of credit and debit card numbers and related personal information.

Security researchers have uncovered a treasure trove of financial data stolen by a stealthy Trojan since 2006.

All totaled, the minds behind the Sinowal Trojan are believed to have stolen roughly 300,000 bank log-in credentials, as well as a similar amount of credit and debit card numbers and related personal information. The findings were detailed today by RSA FraudAction Research Lab. The Sinowal Trojan, also known and Torpig and Mebroot, dates back to 2006 and has been used to target more than 2,700 financial service domains worldwide.

In the past six months alone, the Trojan has compromised and stolen log-in credentials and other information from more than 100,000 online bank accounts, according to RSA, EMC’s security division.

The Trojan horse contains rootkit elements that infect a PC's master boot record (MBR), allowing it to slip past malware defenses. Once downloaded, Sinowal uses an HTML injection feature to inject new Web pages or information fields into the victim’s Web browser. When a user tries to visit one of the 2,700 domains, the fake site pops up instead and prompts the user for log-in or financial information.

RSA described it this way in a blog post: “Even though a prompt like this is not a novel approach to stealing credentials and other information – what struck us the most was the amount of URL "triggers" that cause Sinowal to actually launch this prompt and other functions: Sinowal is triggered by more than 2,700 specific URLs, which means that this Trojan quickly moves into action when users access the websites of what are now hundreds of financial institutions worldwide.”

The compromised data belongs to customers of hundreds of financial institutions from around the world, including the United States, Canada, France, U.K., China and elsewhere.

The RSA Anti-Fraud Command Center has notified law enforcement as well as affected financial institutions.

eweek.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext