Experts sound alarm on Silentbanker Trojan

Powered by SC Magazine
 

Researchers have uncovered a new banking Trojan which steals user data from more than 400 banks worldwide..

Trojan.Silentbanker intercepts account information, redirects traffic to phishing sites, and even alters transactions to send money to the attacker's bank account.

The long list of targets include banks in the US, UK, Ireland, Spain and France.

"The scale and sophistication of this emerging banking Trojan is worrying, even for someone who sees them on a daily basis," wrote Symantec researcher Liam O'Murchu in a company blog.

The most troubling feature of the Trojan is its ability to perform man-in-the-middle attacks to intercept and alter data travelling between the browser and the bank.

This allows the Trojan to modify data and reroute money to another account without the user's knowledge.

The malware also has the ability to steal and upload account data, change DNS settings and reroute users to phishing sites.

O'Murchu noted that the Trojan can display more than 600 pornographic URLs, which he suspects is designed to raise the Trojan's author referral payments.

The current attacks may be just the beginning, however. O'Murchu said that the Trojan is constantly updating itself, checking for new configuration files several times a day.

Symantec urged users to protect against the Trojan by keeping antivirus software up to date. Administrators can also configure firewalls to block the URLs to which the Trojan connects.

Copyright ©v3.co.uk


Experts sound alarm on Silentbanker Trojan
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  13%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 435

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 209

Vote