[Infowarrior] - Bank Botnet Serves Fake Info to Thwart Researchers
Richard Forno
rforno at infowarrior.org
Tue Oct 6 12:10:23 UTC 2009
Threat Level Privacy, Crime and Security Online
Bank Botnet Serves Fake Info to Thwart Researchers
• By Kim Zetter
• October 6, 2009 |
• 12:49 am |
http://www.wired.com/threatlevel/2009/10/urlzone-trojan/
Researchers tracking a gang of online bank thieves found that the
criminals have deployed a devious means to thwart law enforcement and
anyone else trying to monitor their activities.
The gang behind the URLZone trojan, which siphons money from online
bank accounts and then alters a victim’s online bank statement to hide
the fraud, have also devised a method to hide the accounts of mules
they use to launder the siphoned funds.
Researchers at RSA’s FraudAction Research Labs say the gang was aware
that their malware was being tracked by investigators, so they
programmed their command and control server to generate non-mule
accounts to make it more difficult for law enforcement and fraud
investigators to halt laundering through the real accounts.
The URLZone is a Trojan that has been targeting customers of several
top German banks. The victims’ computers are infected with the Trojan
after visiting compromised legitimate web sites or rogue sites set up
by the hackers.
Once a victim is infected, the malware detects when a user is logged
into a bank account, then contacts a control center hosted on a
machine in Ukraine to initiate a money transfer from the victim’s
account, without the victim’s knowledge. The control center tells the
Trojan how much money to wire transfer from the victim’s online bank
account and which mule account should receive the transfer.
The money gets transferred to the legitimate bank accounts of
unsuspecting money mules who’ve been recruited online for work-at-home
gigs, never suspecting that the money they’re allowing to flow through
their account is being laundered. The mules then transfer the money to
the thieves’ chosen account.
Researchers, hoping to extract a list of mule accounts from the
command and control center, infected honeypot computers with the
URLZone Trojan. But when the computers contacted the command and
control center to collect a mule account, the command center fed them
“fake” accounts.
The fraudsters developed a series of tests to check infected computers
to determine if they’re “legitimate” URLZone-infected machines. For
example, every infected computer is assigned a unique identification
code by the Trojan. If the ID is not a valid Trojan ID known by the
server, the fake computer gets fed one of 400 non-mule accounts. The
non-mule accounts are legitimate bank accounts, just not ones the
criminals are using to launder money.
“Interestingly, when generating a non-mule account in order to dupe
anti-fraud security researchers,” RSA researchers write on their blog,
“the Trojan does not display random names and account numbers.
Instead, it displays real bank account details that were previously
entered by URLZone victims as the payees of legitimate transactions.”
The RSA researchers call this the “most unique attribute” of the
botnet, which “speaks to its operators’ caution against having their
criminal pipelines compromised.”
More information about the Infowarrior
mailing list