Financial ransomware now targeting U.S. users
Posted on 16.06.2014
Although the GameOver Zeus botnet and CryptoLocker ransomware have been disrupted, it is still too early for a victory celebration. First, the two week deadline expires on June 17th, leaving just one week left before cybercriminals could regain control of their botnet. Second, stories of the GameOver Zeus and CryptoLocker campaign have already spawned a number of copycats among mobile malware writers.

On June 8th, Kaspersky Lab detected a mobile Trojan now operating in the USA and UK, called Svpeng, which combines the functionality of financial malware with ransomware capabilities. This is the first time that Svpeng, a famous money stealing mobile Trojan in Russia, has turned its attention to other markets.

For now, this piece of malware, allegedly of Russian origin, does not steal credentials, but it is only a matter of time, since Svpeng is just a modification of a well-known Trojan that operates in Russia and is used mainly for stealing money.

Additionally the Trojan's code contains some mentions of the Cryptor method which has not yet been used, so it is likely that it will soon be utilised for file encryption. In this case Svpeng will become the second most well-known mobile malware with such functionality after Pletor, which appeared in the wild in May 2014.

The Trojan checks a user's phone for a list of certain financial applications - more likely for future use, where it starts stealing login/password of online banking as it does now among Russian banks accounts. English-language Svpeng currently checks the presence of the following applications on a victim's device:
  • USAA Mobile
  • Citi Mobile
  • Amex Mobile
  • Wells Fargo Mobile
  • Bank of America Mobile Banking
  • TD App
  • Chase Mobile
  • BB&T Mobile Banking
  • Regions Mobile.
It then locks the screen of the mobile device with the imitation of an FBI penalty notification letter and demands $200 in the form of Green Dot's MoneyPak cards.

Today we see that more than 91% of attacks using this Trojan target English-language users based in U.S. and UK. The other 9% targets India, Germany and Switzerland. It could soon reach other English-speaking countries and even other languages.

"It is impossible to repel an attack of American Svpeng if a mobile device doesn't have a security solution - the malware will block the device completely, not separate files as Cryptolocker did. If it happens to you, you can do almost nothing. The only hope for unlocking the device is if it was already rooted before it was infected; then it could be unlocked without deleting the data. One more option to remove the Trojan if your phone wasn't rooted is to boot into 'Safe Mode' and erase all data on the phone only, while SIM and SD cards will stay untouched and uninfected," says Roman Unuchek, Senior Malware Analyst at Kaspersky Lab.





Spotlight

Successful strategies to avoid frequent password changes

Posted on 19 August 2014.  |  After a widespread, nonspecific data breach, the conventional wisdom is that people should change all their passwords. But, there’s a better way.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Aug 20th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //