Zeus pillages billing providers

Powered by SC Magazine
 

Malware takes screen caps of payment website.

The infamous Zeus banking trojan has been reconfigured, and its new scheme targets users of cloud-based billing companies, instead of banks.

Researchers at security firm Trusteer discovered the new variant of the data-stealing malware which was typically used by criminals to lift banking credentials and empty corporate accounts.

The configuration targeted customers of Canadian cloud billing services Ceridian. once infected, user machines would take screenshots of the payroll services web page, Trusteer chief technology officer Amit Klein said. 

“This allows Zeus to steal the user ID, password, company number and the icon selected by the user for the image-based authentication system."

By setting their sights on business payroll systems, miscreants could funnel larger amounts of money than if they targeted bank accounts. With the valid credentials to access an organisation's payroll system, the crooks can add fake employees and designate them to receive cash.

Despite Microsoft recently announcing a major takedown effort against Zeus' command-and-control structure, the malware appears to be living on.

This article originally appeared at scmagazineus.com

Copyright © SC Magazine, US edition


Zeus pillages billing providers
 
 
 
Top Stories
Coalition's NBN cost-benefit study finds in favour of MTM
FTTP costs too much, would take too long.
 
Telcos finally briefed on data retention details
Update: AGD offers list of data to be stored.
 
Qld Health hires short-term CIO, CTO
Ray Brown leaves after five years at IT helm.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 557

Vote