SecureWorks finds stolen data cache, variants of Prg trojan

Powered by SC Magazine
 

Researchers at SecureWorks have discovered several caches of stolen data containing the personal and financial information of 10,000 corporate and home PC users, as well as new variants of the Prg trojan.

The caches contain bank and credit union, credit card and Social Security numbers, usernames and passwords, according to SecureWorks officials.

Researcher Don Jackson said that hackers are working around encryption standards.

"When data is located, it is always encrypted to keep others from ‘leeching.’ New variants of the trojan have new ways of encrypting that data, making old analysis tools obsolete," said Jackson. "New encryption methods must be reverse-engineered from raw machine code."

The company said that the trojan’s variants have the ability to lift sensitive data from PCs before that data is encrypted and sent to SSL-protected sites. Numerous hacker groups have launched attacks using the malware, according to SecureWorks.

Jackson told SCMagazine.com today that the trojan highlights the trend of increased use of malware-creation kits.

Earlier this month, trojans controlled by Russian gangs attacked mostly Italian victims in a large-scale operation aided by the MPACK kit.

"It’s being posted on hacker sites in the underground, and people just buy it and use it," he said, adding that the kits "allow people to send out these variants pretty quickly."

SecureWorks finds stolen data cache, variants of Prg trojan
 
 
 
Top Stories
NSW Govt gets ready to throw out the floppy disks
[Opinion] Dominic Perrottet says its time for government to catch up.
 
iiNet facing new copyright battle with Hollywood
Fighting to protect customer details.
 
The CISO’s dilemma: Do you trust your partner’s partner?
[Blog post] How far down the chain do you check?
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 316

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 121

Vote