[Infowarrior] - Virtual Heist Nets 500,000+ Bank, Credit Accounts

Richard Forno rforno at infowarrior.org
Sat Nov 1 15:08:03 UTC 2008


Virtual Heist Nets 500,000+ Bank, Credit Accounts

http://blog.washingtonpost.com/securityfix/?hpid=sec-tech

A single cyber crime group has stolen more than a half million bank,  
credit and debit card accounts over the past two-and-a-half years  
using one of the most advanced strains of computer spyware in  
existence, according to research to be published today. The discovery  
is among the largest stolen data caches ever recovered.

Researchers at RSA's FraudAction Research Lab unearthed the massive  
trove of purloined data while tracking the activities of a family of  
spyware known as the "Sinowal" Trojan, designed to steal data from  
Microsoft Windows PCs.

RSA investigators found more than 270,000 online banking account  
credentials, as well as roughly 240,000 credit and debit account  
numbers and associated personal information on Web servers the Sinowal  
authors were using to set up their attacks. The company says the cache  
was the bounty collected from computers infected with Sinowal going  
back to February 2006.

"Almost three years is a very, very long time for just one online gang  
to maintain the lifecycle and operations in order to utilize just one  
Trojan," said Sean Brady, manager of identity protection for RSA, the  
security division of EMC. "Only rarely do we come across crimeware  
that has been continually stealing and collecting personal information  
and payment card data, and compromising bank accounts as far back as  
2006."

Sinowal, also called "Torpig" and "Mebroot" by various anti-virus  
companies, constantly morphs its appearance to slip past security  
software. Between April and October, researchers spotted an average of  
60 to 80 new Sinowal variants per month (see graphic above). Indeed,  
in the 24 hours ending Oct 30, security researchers at  
ThreatExpert.com saw at least three new versions of Sinowal being  
released into the wild.

On Oct. 21, a new Sinowal variant was submitted to Virustotal.com,  
which scans incoming files against nearly three dozen commercial anti- 
virus programs and maintains a historical record of those results.  
Only 10 out of 35 of those security programs - or 28.5 percent -  
identified it as such or even flagged it as suspicious. Another scan  
of a Sinowal variant sent to VirusTotal a week earlier yielded  
slightly better results, with just over half of the anti-virus tools  
detecting it as malicious.

Sinowal also is unique in that hides in the deepest recesses of a host  
computer, an area known as the "Master Boot Record." The MBR is akin  
to a computer's table of contents, a file system that loads even  
before the operating system boots up. According to security experts,  
many anti-virus programs will remain oblivious to such a fundamental  
compromise. What's more, completely removing the Trojan from an  
infected machine often requires reformatting the system and wiping any  
data stored on it.

The Trojan lies in wait until the victim visits one of more than 2,700  
bank and e-commerce sites hard-coded into the malware, at which point  
it injects new Web pages or information fields into the victim's Web  
browser. For example, Sinowal can falsely prompt an unsuspecting  
victim for personal information, such as a Social Security number or  
password when he or she visits one of the targeted financial  
institution Web sites. Any stolen data is regularly uploaded to Web  
servers controlled by the Trojan's authors.

The makers of Sinowal typically have spread their Trojan by sewing  
malicious code into the fabric of large numbers of legitimate, hacked  
Web sites. When an unsuspecting Windows user visits one of these  
sites, the code left on the site tries to install the Trojan using one  
of several known Web browser security holes, such as vulnerabilities  
found in popular video and music player plug-ins like Macromedia Flash  
and Apple's QuickTime player.

The Sinowal gang appear to have profited handsomely from a spate of  
high-profile Web compromises reported of late: More than 100,000 bank  
account credentials were stolen by the Trojan in the last six months  
alone, RSA found (see graphic above).

It's not clear exactly who's behind these attacks, but evidence points  
to Russian malware gangs. Brady said Sinowal had early ties with the  
Russian Business Network, a notorious, cyber-crime friendly Web  
hosting firm in St. Petersburg, Russia, that was dispersed last year  
due to international media attention. While the Sinowal authors no  
longer use RBN as a home base, Brady said his team could find no trace  
of a single Russian victim in the entire database of credentials and  
identities stolen from customers of hundreds of banks across the  
United States, Europe and Asia, and at least 27 other countries.

According to several analysts at iDefense, a security intelligence  
firm in Sterling, Va., more than a dozen criminals operating the  
Sinowal data theft network have been thumbing their noses at  
authorities for some time. While examining a Web server used in a  
Sinowal attack earlier this year, iDefense found a spoof of the U.S.  
Marshals Web site apparently created by the criminals (click the image  
above to enlarge).

iDefense said each nickname on the fake site corresponds to the  
digital credentials that gang members used to access the Web server.  
The bogus wanted poster includes caricatures of such famous figures as  
Mikhail Gorbachev; Leonid Brezhnev, Joseph Stalin (Perevodchik,  
"translator" in Russian); Vladimir Lenin; and Russian Prime Minister  
Vladimir Putin ("Shaitan," or "devil"). 


More information about the Infowarrior mailing list