UK police issue 'vicious' Trojan alert

Keystroke-logging 'Swiss army knife'


Britain's top cybercrime fighters have joined up with the banking industry today in warning of the latest attempt to defraud online banking customers. The attacks, in the form of 'Trojan horse' emails, have been spammed out to a number of email account holders randomly across the country. The emails contain links to malicious websites in North America and China. The UK's National Hi-Tech Crime Unit (NHTCU) is working with the Internet industry to have these sites shut down. At the time of writing three have been taken out of commission but others remain active.

NHTCU and banking organisation APACS have teamed up to warn on the threat in a highly unusual move that underlines the seriousness of the risk. An NHTCU spokeswoman explained: "This is really vicious. It's just a normal phishing attack but something that tries to install backdoors on victims' PCs".

Touch of Evil

The spam emails contain details of a fictitious order for Web hosting or computer goods and thank the email recipient for a non-existent order. In addition, they also display the apparent cost that will be charged to their credit card. The email also contains a link to one of a number of maliciously constructed website in order to "view the order in more detail". If an email recipient is duped into visiting one of these sites, it appears merely as a site under construction. But in the background malign actions are afoot designed to load a variant of the Mitglieder proxy Trojan onto vulnerable Windows boxes.

These maliciously constructed sites harbour a Trojan downloader routine capable of dropping a keystroke logging program onto vulnerable PCs. This exploit is possible because of well-known Windows security bugs, namely an MHTML URL vulnerability (MS04-013) and an ADODB.Stream vulnerability. Both of thses flaws can be fixed by the latest Internet Explorer megapatch (MS04-025).

If a machine becomes infected, the next time a customer uses their PC to access their own online banking site, the Trojan can potentially record their secret passwords and PINs used to log-on. This information is accessible to attackers thereby compromising the security of victim's online banking accounts. In addition, the Trojan surrenders control of the machine to attackers. It's unclear how many users have been hit by the attack.

Protect and survive

Although the threat from Trojans is a serious one if precautions and advice are not taken, the banking industry offers a number of security measures to defend against these types of attack. These include partial passwords, so not all characters from a password are revealed at any one time. This is further enhanced by the use of drop-down lists, which rely on the use of a mouse to select alphabetic or numerical characters. In addition, some banks also offer customers the opportunity to purchase reduced-price security software via their websites.

Sandra Quinn, Director of Corporate Communications at APACS, said: "By being wary of unsolicited emails and maintaining basic security measures on your computer you can go online with confidence."

APACS refers consumers to its previously published guidelines on safe computing.

Detective Chief Superintendent Len Hynds, Head of the NHTCU said: "The NHTCU is continuing to work hard to bring the perpetrators of these elaborate scams to justice. The criminals behind these attacks are constantly evolving their techniques and changing tactics to target a wider range of victims. With this range of exploits being blended in one piece of code, it is not just about online banking. There is a second keylogger and a program that allows the machine to act as a mail proxy that could be used by spammers. It is the Swiss Army knife of the cyber-criminal." ®

Related stories

Cybercops seize Russian extortion masterminds
UK police arrest 12 phishing mule suspects
UK police arrest copycat phisher
UK banks and police proffer anti-phishing advice


Other stories you might like

  • Huawei sets out its digital transformation stall – and it’s big

    Businesses rarely know how to get started. Huawei can do the heavy lifting

    Advertorial Digital technology has been a lifeline to work, education and healthcare throughout the pandemic. And regardless of how long it takes for the world to return to a pre-pandemic state, we can be certain that advanced connectivity and computing technology will become ever more important.

    In short, digital transformation is a must, and critical for any enterprise to build global competitiveness. It's no longer a question of whether to do it or not, but how to do it. However, we have learned, in conversations with our customers, that most businesses don’t know where to start - or how or start - their transformation process. They recognise that it is not something they can implement effectively on their own and need an expert partner to guide them through.

    For example, large enterprises may have significant financial resources - but they also typically manage very complex operating environments, traversing multiple sites, multiple data centres, multiple networks in multiple countries. In addition, their application environments may encompass huge numbers of mission-critical tasks, and maybe there are many non-compatible applications, perhaps inherited through acquisitions, doing the same things - but in different ways. Addressing these issues on your own is like turning around an oil tanker. It can be done, but it takes too much time and it’s hard.

    Continue reading
  • Twitter's algos favour tweets from conservatives over liberals because they generate more outrage online - study

    Plus: Microsoft acquires an AI content moderation startup to prevent hate speech on the Xbox and more

    In brief Twitter’s algorithms are more likely to amplify right-wing politicians than left-wing ones because their tweets generate more outrage, according to a trio of researchers from New York University’s Center for Social Media and Politics.

    Last week, the social media platform’s ML Ethics, Transparency and Accountability (META) unit published research that showed users were more likely to see posts from right-wing elected officials across six countries - including the UK and the US - than their left-wing counterparts. Twitter said it didn’t know why its algorithms behaved this way.

    Political scientists from NYU, however, have been conducting their own research into Twitter’s algorithms and they believe it's because tweets from conservative politicians are more controversial and attract more attention. They have analyzed the number of retweets from tweets made by Congress members of the Republican and Democratic party since January 2021 and found the same pattern Twitter’s engineers did.

    Continue reading
  • New World: Grindy? Check. Repetitive? Check. Fun? We hate to say it... but check

    Goddamn it, Jeff Bezos' lot can make a passable MMORPG after all

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our (sometimes) monthly gaming column. At long last, New World is out and we've been diligently grinding our faces off to answer the question: Can Jeff "mountains of cash" Bezos make a decent MMO?

    On 28 September, Amazon Games released its first serious, big-boy-pants-on video game: New World. Why does this matter? First of all, it's Amazon. Not content with anything short of global domination, Jeff Bezos' e-commerce and cloud computing juggernaut has had a sticky start with gaming – two titles prior to New World, Breakaway and Crucible, were scrapped – and people would love to see the venture fail. I would love to see the venture fail.

    Secondly, New World is an MMORPG. That's "massively multiplayer online roleplaying game" to the untainted. As far as game development goes, it's hard to think of a more complicated and ambitious genre, especially as this has transpired to be Amazon's "debut" outside of the mobile platform.

    Continue reading

Biting the hand that feeds IT © 1998–2021