Banking malware, including Trojans which steal your online credentials and screen grabbers, usually place heavy emphasis on remaining undetected for as long a period of time as possible. TrickBot, Emotet, BackSwap and the experimental MysteryBot are only a handful of the countless forms that banking malware can take. The majority of these malware variants will deploy on victim machines in order to gather information and steal credentials, of which will then be sent to a command-and-control (C&C) server controlled by threat actors. Once data relevant to a financial account is stolen and transferred, this information will be used to plunder bank accounts and conduct identity theft, or will be prepared for sale on the Dark Web. See also: The Dark Web: How much is your bank account worth? A new financial malware bucks the trend and rather than employ heavy stealth techniques to stay hidden, instead, camouflages itself as a legitimate bank security system. Dubbed CamuBot, IBM X-Force researchers said on Tuesday that the financial malware is masquerading as security modules required by target banks for online business banking. The malware appears to be focusing on Brazilian banks at present. Limor Kessem, Global Executive Security Advisor at IBM Security says that business banking customers are most at risk of being targeted. CamuBot first came on the radar in August. The new malware strain was spotted by IBM due to a slew of sophisticated, targeted attacks against companies and public sector organizations which rely on social engineering. CNET: That VPNFilter botnet… [Read full story]
ZDNet is a business technology news website published by CBS Interactive, along with TechRepublic. The brand was founded on April 1, 1991, as a general interest technology portal from Ziff Davis and evolved into an enterprise IT-focused online publication owned by CNET Networks.