SHARE
Facebook X Pinterest WhatsApp

Banking Trojans Return to the Spotlight

Ten Rules for the Cyber Incident Responder It’s been a while since I’ve talked about banking Trojans, but it appears that a wave of new Trojans has cropped up in recent weeks. Researchers at PhishMe announced that they have uncovered a Trojan called Dyre, which was designed to bypass SSL security in order to steal […]

Written By
SP
Sue Poremba
Jun 30, 2014
Slide Show

Ten Rules for the Cyber Incident Responder

It’s been a while since I’ve talked about banking Trojans, but it appears that a wave of new Trojans has cropped up in recent weeks.

Researchers at PhishMe announced that they have uncovered a Trojan called Dyre, which was designed to bypass SSL security in order to steal banking data. The malware is delivered through phishing emails with subject headings involving financial transactions like invoices and tax payments. According to eSecurity Planet:

The emails contain links to files on LogMeIn’s Cubby.com file storage service. “Since Dropbox has been quick to block phishing links, the attackers needed a new legitimate service,” noted PhishMe’s Ronnie Tokazowski.

Click on the link in the email, and you’ll download a zip file. Open the zip file, and it installs the malware, which monitors all of the victim’s browser traffic, including SSL traffic, with the aim of stealing and uploading online banking login credentials.

A Dark Reading article stated that Dyre appears to be the origin of a new banking malware family, meaning it is unrelated to Zeus. However, Zeus’ lineage is still causing trouble. Another new form of malware, dubbed Zberp, was discovered by Trusteer. Zberp combines features from both Zeus and Carberp, which gives it wide-ranging features. According to PC World:

It can gather information about infected computers including their IP addresses and names; take screen shots and upload them to a remote server; steal FTP and POP3 credentials, SSL certificates and information inputted into Web forms; hijack browsing sessions and insert rogue content into opened websites, and initiate rogue remote desktop connections using the VNC and RDP protocols.

Finally, Kaspersky Lab reported a new financial attack that is wreaking havoc on a European bank, stealing a half million Euros in a week. According to Securelist, the banking fraud, called Luuuk, uses a Man in the Browser campaign to intercept the banking data. ZDNet further explains the Luuuk Trojan:

Most of the victims are located in Italy and Turkey, and according to log files that included events from bots reporting to a command and control (C&C) web panel, sums stolen from each bank account ranged from 1,700 to 39,000 euros. The team says it is likely thefts were managed automatically, and fraudulent transactions were carried out as victims logged into their online bank accounts.

ZDNet added that the origin of the Trojan is unclear. It may be a brand-new strain or it might be a modified piece of malware—no one is quite sure:

The reason for the confusion is simple: Two days after Kaspersky discovered the C&C server, “every shred of evidence” that could have been used to trace the campaign was removed by the cybercriminals. However, this is believed to have taken place due to changes in technical infrastructure used within the campaign rather than as a signal criminal activities were over.

It’s not like banking Trojans had disappeared, but with all of the other security breaches and threats that have happened in the past year, the malware has been traveling a bit under the radar. These three Trojans are just the latest banking malware to surface. Certainly more banking-focused malware exists out in the wild, but perhaps it’s time we return our focus to these types of online frauds.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.