Rescue of Chilean miners used as lure by banker Trojan
Posted on 02.09.2010
PandaLabs uncovered a new malicious code, Banbra.GUC, which lures users with a video about the rescue of the trapped Chilean miners. This is a new variant of the infamous Banbra family of banker Trojans, which first emerged in 2003.


When run, the Trojan displays the video while it delivers its malicious payload. More specifically, the Trojan is designed to steal passwords for online banking services.

Among the banks affected are Banco Santander and the Banco do Brasil. If a compromised user visits any of the pages in question, Banbra.GUC downloads some executables that simulate the bank’s page. Once the user has entered their login details, the executable closes and redirects the user to the genuine Web page of the bank. The Trojan then sends all this information to its creator via email.

“This is a particularly dangerous Trojan, as in addition to stealing bank details it installs other malware which the cyber-criminals can control”, warns Luis Corrons, Technical Director of PandaLabs. “Users must be very careful, as this type of Trojan is usually distributed in email messages or on social networks with links that seem to point to a YouTube video. However, they actually download the Trojan to the PC. In this case the Trojan does play the video to avoid raising any suspicion while infecting users”, explains Corrons.





Spotlight

The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Aug 29th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //