Cybercrime Intelligence Report Cybercriminals use Trojans & money mules to rob

advertisement
Issue no. 3, 2009
Cybercrime IntelligenceReport
Report
Cybercriminals use Trojans
& money mules to rob
online banking accounts
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Introduction
Cybercriminals keep on targeting online customers of banks. They are reaching new levels of
sophistication in their attacks. They refine their methods, and search for new ways to maximize their
illegal profit while minimizing their chance of detection. In this report, we will show you a recent
discovery by our Malicious Code Research Center (MCRC). We will expose the tools and methods a
cybergang used to successfully steal 300,000 Euro from German bank accounts during the first 22 days
of their cybercrime spree.
Our research shows, that this gang of cybercriminals used a combination of Trojans and money mules to successfully
avoid anti-fraud systems to rob bank accounts. This not only shows a new height of sophistication, but also signals the
start of a new trend in cybercrime. This new trend is a global one, as illustrated by several reports coming out the US
showing that bank accounts of SMBs have been looted by cybercriminals using similar techniques.
This latest development moves bank Trojans used by cybercriminals to the next level. More than a year ago, Finjan
identified Zeus - another Trojan which today has become one of the most popular Trojans used by cybercriminals.
How did these cybercriminals avoid detection by anti-fraud systems? What means and methods did they
use? How did they ensure that no money trail could be traced to them?
In this report, we will shed some light on these questions, including the cybercrime toolkits they used.
If you want to learn more about various infection techniques used by cybercriminals in general to evade detection
by security products, you can read about it in our previous publications that covered code obfuscations, evasive
techniques, and dynamic encryption methods.
Nature of the attack
This specific attack was aimed at German banks‟ customers. It used websites (legitimate infected ones as well as
fake websites) as its vehicle to spread malicious code that was later used to steal online banking credentials. The
cybergang used the well-known commercial-grade LuckySpoilt crimeware toolkit to exploit the users‟ browsers and
install the Trojan on their PCs. Having the Trojan successfully installed on the victim‟s PC, the URLZone bank Trojan
toolkit was used to send instructions and to control the money transfer from the victims‟ bank accounts via money
mules to the cybergang. The URLZone bank Trojan used various techniques to stay „under the radar‟ of common
anti-fraud systems.
The command and control (C&C) server was hosted in Ukraine and targeted German banks‟ customers. All our
research information was provided to the German police for further investigation and action.
The Crimeware Toolkits
As we reported in our previous reports, it does not take much for today‟s cybercriminals to infect website visitors
with a Trojan. Using commercial software (crimeware toolkit) available for $100-$300 on hacking forums, the
cybercriminal can easily launch a massive attack. It allows him to insert exploiting code to vulnerable websites
(legitimate or fakes ones). Once a visitor visits one of the infected websites, an exploit code, served by the
crimeware toolkit, installs a Trojan on the PC in use.
The following screenshots were taken from the crimeware toolkit (LuckySpoilt) administration panel. As indicated
below, the cybergang managed to attract around 90,000 visitors or potential victims. Out of this number of
visitors, 6,400 were infected – a “success” score of about 7.5%. In other words, 1 in every 14 to 15 visitors was
victimized.
Page 2
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Page 3
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
The infected machines ended up with a bank Trojan – in this case, the URLzone bank Trojan. This nasty piece
of crimeware has the following features:
It logs credentials and activities of bank accounts
It takes screenshots of webpages served by the websites mentioned before
Installed on the victims’ machines, it steals money from the compromised accounts
It hides its fraudulent transaction(s) in the report screen of the compromised account
Its C&C server sends instructions over HTTP about the amount to be stolen and where the
stolen money should be deposited
It also logs and reports on other web accounts (e.g., Facebook, PayPal, Gmail) and banks
from other countries
The Command & Control System
Having infected the victim‟s PC with the Trojan, it then connects to the C&C server to receive instructions. Our
research found instructions that included: the amount to steal from the bank account, the money mule‟s account
details to transfer the money, take a screenshot of the online banking interface, etc.
Screenshot found on the hacker‟s server. It was taken by the Trojan while the victim was
logged-in into the online banking system
The communication between the Trojan and the C&C server is conducted over HTTP, having the data XORencrypted.
Page 4
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Taking a closer look at the administration panel of the C&C management interface we see some of the instructions
sent to the Trojan as well as logs of successful money transfer transactions. For privacy reasons, we erased
identifiable information.
It appears that this cybergang knows how anti-fraud systems used by
banks these days work. Anti-fraud systems are desgined to detect
unusual money transfers as well as strange behaviour by its customers
on their accounts.
To minimize detection by anti-fraud systems, the cybergang used
various parameters to define the amount of money it will steal on each
transaction.
Criteria used by this cybergang included: making sure that the victim‟s
balance is positive, ensuring that the amount to be stolen is not too
high, setting a random amount on each transaction, making sure that
the remaining balance remains positive. They are all aimed at
minimizing detection by the anti-fraud systems. The screenshot on the
right shows one of the forms to set such criteria.
Page 5
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Below is a snippet from the C&C code, showing how the exact amount to be stolen is calculated.
The Money Mule
Money mule accounts are legitimate bank accounts owned by legitimate bank users. To conduct their crime,
cybercriminals hire „mules‟ by falsely telling them they are working for a legitimate business. Due to the current
economic slowdown, more and more innocent people find themselves becoming part of these criminal activities
without their knowledge. These bank account owners or “mules” are normally unaware that they are “muling”
stolen money, but think that they are being paid for “working from home” and other moneymaking schemes.
Needless to say, social engineering is part of the scam. The money mule system avoids any direct links to the
cybercriminals – the “perfect” way to avoid detection!
Once a “mule” is hired by the cybergang, the stolen money is transferred to his/her bank account. Later on, the
“mule” is asked to transfer the stolen amount - after deduction of his or her commission - to a bank account
provided by the cybergang.
To avoid warning signs by anti-fraud systems at the bank, the money mule accounts are only used for a limited
number of times within a certain timeframe. Since banks monitor large bank transfers, the amount of money
deposited in a money mule account is predefined in order to stay under the radar.
We call this the Anti anti-fraud activity.
Page 6
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
The amount stolen by the cybergang
Let‟s now have a look at an account that was robbed by this
cybergang. On the right, you can find a log record of a transaction
as found on the cybergang server.
As can be seen on the log transaction, the C&C sent “steal-money”
instructions to the Trojan. The instruction included the amount to
be stolen and the money mule account number to be used to
“mule” the stolen money. After the Trojan successfully executed its
instructions on the victim‟s machine, it reported back to the C&C
server. The transaction was then logged as a “successful
transaction”. In this log, we can find that the Trojan managed to
steal Euro 8,576.31.
Avoiding detection by the bank‟s anti-fraud system is one goal of
the cybergang; hiding the money transfer transaction from the
victim is the other.
The cybergang knows, that once the victim reports the fraudulent
money transfer to his/her bank, their „business‟ will end then and
there. To minimize this risk, the Trojan creates a forged bank
report page that is then presented to the victim, effectively hiding
the fraudulent transaction.
09:39:04 2009-08-24 GMT FJFAFJP1HAWOHNCAIN
NAME=POST1
USERHOST=postbank.de
USERACC=[REMOVED]
USERPASS=[REMOVED]
BALANS=2027.69
INET_LIMIT=15000.00
DISPO_LIMIT=7000.00
MAXBETRAG=
BLZ=60050101
TRUEAMOUNT=53,94
AMOUNT=8576,31
%DROP_BLZ%=|LBBW/BW-BANK STUTTGART|
%DROPNAME%=|xxx xxx|
%KONTONUMMER%=|1000000001|
%BLZ%=|60010070|
%C1%=|Ref Num 123456|
%C2%=|Ref Num 123456|
%C3%=|Ref Num 123456|
%C4%=|Ref Num 123456|
COMMENT: Tigr
EXINF=
DATE: 24.08.2009
VERSN: iexplore.exe 6.0.2900.2180
IP: 77.0.000.000
The Trojan hides the transaction it conducted from the victim‟s
machine by forging a bank report screen on the infected computer.
In this case, the transferred amount is showed as Euro 53.94, instead of the real amount of Euro 8,576.31. The
Trojan generated a forged screen showing the transferred amount as Euro 53.94, and sent it back to its C&C as
an image as is shown below. If the victim would log-in into his/her online banking account from a different,
uninfected, computer, the real transaction will show up.
Page 7
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Taking a closer look at the outlined amounts in the screenshot, we can clearly find that the amount indicated as
being transferred is Euro 53,94. This amount is “hiding” the real fraudulent transaction conducted by the Trojan of
Euro 8,576.31. The total balance shown at the top of the bank statement of Euro 1,913.75 is forged by the Trojan.
The victim and the bank remain unaware of what has happened to this bank account.
How much did they make on their cybercrime spree?
From August 11 until August 26, the cybergang stole a total of Euro 193,606, or about Euro 12,000 a
day.
From August 30 at 15:50 until September 1 at 11.48, they stole a total of Euro 42,527 or about Euro
21,000 a day.
There was a gap in their cybercrime activities of four days.
If we consider this gap, we see that the cybergang made an estimated total of around Euro 300,000
is just 22 days.
The longer the Trojan remains active, the more money is it able to steal for this cybergang.
On an annual basis, this cybergang could make close to Euro 5 M. or $ 7.3 M. annually.
As per our policy, we informed the responsible German law enforcement agencies of the criminal activities of this
cybergang and the methods they use.
Page 8
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Cybercrime pays – and banks remain a prime target
As we covered in previous reports, cybercrime pays. Financial data remain the prime target. Cybergangs and their
methods keep on refining their attacks to generate as much income as possible, while avoiding detection.
Online bank users should be alert, and make sure that their web security is updated. For banks and financial
institutions, their best defense is a unified web security solution with real-time content inspection. Such a solution
inspects each and every piece of incoming and outgoing web content. Based on its intentions, malicious code is
blocked before it has a chance to execute. Such a solution is also highly effective to prevent “Trojans phoning
home” as the bank Trojan described above did.
With an adequate web security solution, it is possible to stay one step ahead of cybercrooks!
This “Cybercrime Intelligence Report" is brought to you by Finjan’s
Malicious Code Research Center (MCRC)
Finjan’s MCRC specializes in the detection, analysis and research of
web threats, including Crimeware, Web2.0 attacks, Trojans and other
forms of trojan. Our goal is to be steps ahead of hackers and
cybercriminals, who are attempting to exploit flaws in computer
platforms and applications for their profit. In order to protect our
customers from the next Crimeware wave and emerging trojan and
attack vectors, MCRC is a driving force behind the development of
Finjan’s next generation of security technologies used in our unified
Secure Web Gateway solutions.
For more information, please also visit our info center and blog.
For Additional Information
© Copyright 1996 - 2009. Finjan Inc. and its affiliates and subsidiaries. All rights reserved.
please visit www.finjan.com or contact our regional offices:
All text and figures included in this publication are the exclusive property of Finjan and are for your personal and non-commercial use. You may not
modify, copy, distribute, transmit, display, perform, reproduce, publish, license, create derivative works from, transfer, use or sell any part of its
content in any way without the express permission in writing from Finjan. Information in this document is subject to change without notice and does
not present a commitment or representation on the part of Finjan. The Finjan technology and/or products and/or software described and/or referenced
to in this material are protected by registered and/or pending patents including European Patent EP 0 965 094 B1 and U.S. Patents No. 6092194,
6154844, 6167520, 6480962, 6209103, 6298446, 6353892, 6804780, 6922693, 6944822, 6993662, 6965968, 7058822, 7076469, 7155743,
7155744, 7418731 and may be protected by other U.S. Patents, foreign patents, or pending applications.
US & Canada
Toll Free: 1 888 FINJAN 8 (1 888 346 5268)
Tel: +1 408 452 9700
Email: salesna@finjan.com
Mediterranean/APAC & India
Tel: +972 (0)9 864 8200
Email: salesis@finjan.com
Central & Eastern Europe
Tel: +49 (0)89 673 5970
Email: salesce@finjan.com
UK & Ireland
Tel: +44 (0)1252 511118
Email: salesuk@finjan.com
Benelux & Nordic
Tel: +31 (0)33 454 3555
Email: salesne@finjan.com
Finjan, Finjan logo, Vital Security, Vulnerability Anti.dote, Window-of-Vulnerability, RUSafe and SecureBrowsing are trademarks or registered
trademarks of Finjan Inc., and/or its affiliates and subsidiaries. Sophos is a registered trademark of Sophos plc. McAfee is a registered
trademark of McAfee Inc. IBM Proventia Web Filter technology is a registered trademark of IBM Internet Security Systems. Kaspersky is a
registered trademark of Kaspersky Lab. SurfControl and Websense are registered trademarks of Websense, Inc. Microsoft and Microsoft Office
are registered trademarks of Microsoft Corporation.
All other trademarks are the trademarks of their respective owners. Q3, 2009.
Finjan Malicious Code Research Center - CYBERCRIME INTELLIGENCE REPORT
Download