Feeds

back to article Small banking Trojan poses major risk

Security researchers have discovered a tiny, but highly capable banking Trojan. Tinba (Tiny Banker, or otherwise known as Zusy) hooks itself into browsers before stealing banking login information and snaffling network traffic. The malware used injected code and Man in The Browser (MiTB) tricks to change the way banking …

COMMENTS

This topic is closed for new posts.
Silver badge

Sir

No mention of the targetted URL's though.

1
0

Re: Sir

^what he said.

Four, hardcoded. So it should be trivial for us to block them, if only we knew what they were.

3
0

@HH

The 4 hardcoded domains are for the C&C servers, not the target(s). Dear Runcie is wondering which banking institutions are targetted (presumably to consider avoiding them).

0
1
EJ

Why I like independent researchers and loathe vendors

I'm sure CSIS sees the revelation of the hardcoded URLs as giving away proprietary info that gives them an advantage, and thus they'd lose their chance at getting a few panicked users to buy licenses of their product. It'll come out once an independent gets their hands on it.

3
0
Thumb Up

redacted

Well one of the hosts is visible in the image on the linked writeup - in the hex-dump, they masked out the ASCII, but left the hex version visible - so that's one down...

2
0
Silver badge
FAIL

As a 'Merkin I have yet to see true two factor authentication implemented

at any banks I deal with. Most of them ask you for a second code that is ostensibly "something you know" but if you are running a man-in-the-middle website attack, the computer sees it as just two passwords.

0
0
Anonymous Coward

Re: As a 'Merkin I have yet to see true two factor authentication implemented

You have to ask ,but BofA does have it. They send you a code via SMS on your cell phone. You wont find t his any were on their web site.

0
0
Anonymous Coward

Re: As a 'Merkin I have yet to see true two factor authentication implemented

"BofA does have it. They send you a code via SMS on your cell phone."

Which is annoying if, like me, you have SMS totally switched off (by choice) on your phone. Fortunately, they will also email to you. Of course, they insist upon doing that anytime they don't see their cookie on your machine, which, if you are security conscious and only allow their site to set session cookies, and wipe them after you are done, means every damn time.

0
2
Silver badge

Re: As a 'Merkin I have yet to see true two factor authentication implemented

I have sighted a security token with "Bank of Queensland" branding in the wild... so there's at least one bank that knows what "two factor" means.

0
0
Silver badge

Re: As a 'Merkin I have yet to see true two factor authentication implemented

In UK NatWest use Debit Card+reader to authenticate any new on-line transfers via 2 factor.

Here in Switzerland UBS use same with special card + reader for actual login.

1
0
Silver badge

So basically...

"Be careful when doing online banking", that's what this boils down to.

Its this reason why I always use MSIE's "InPrivate" navigation mode when doing stuff like this. This mode turns off /and/ blocks all plugins, history and (temporary) internet data such as cookies is saved in memory /only/ (so close browser, remove history & data) and because of this it also thwarts any tracking outside the current session.

And it does indeed help to use a bank which takes security seriously. Some banks tend to use a static list of numbers which you can use to authorize your transactions, which I personally consider quite stupid. With challenge/response you will at least rule out any extra options for the man in the middle.

My bank generates numbers which I need to process locally with my bankcard and pincode. A device generates a return code based on several aspects like account number, amount of money wired, account number to which money is transferred, etc.

So even if a 'man in the middle' tries to mess with the data by adding extra payments or such it would automatically render my signature invalid thus the whole transaction will fail.

2
0
Anonymous Coward

Browsers alone will always be vulnerable

No matter how strong the authentication when a user signs in to online banking, the main defence against such attacks is protection of each transaction, separately, by some means external to (i.e. independent of) the device on which the browser is running.

As others have noted, some card issuers provide card readers which, in conjunction with the user's debit card, generates one-time codes can be used both for strong authentication and (by entering transaction details) for digitally signing each transaction. Since the card reader is independent of the device on which the browser is running and isolated from e.g. the internet, this arrangement is far more difficult to subvert.

The real question is why don't all card issuers provide such devices? And why are they not used for securing other internet transactions?

1
0
Silver badge

Re: Browsers alone will always be vulnerable

no. My browser wont be. Its got root write privileges only and cannot be patched by a user process, even if that user process knows that it was compiled from source and running on Linux.

This is a windows specific trojan that relies on the fact that firefox etc and users have the complete ability to write and modify anything in the windows systems folders.

1
0
Bronze badge
Alien

2-factor for CC transactions?

My bank uses 2-factor (card+card reader) authentication, and I generally feel pretty safe when using it. This is only available for internet banking though; when I use a credit card to buy stuff, I don't get the same protection.

Isn't it time credit card companies started doing the same thing as banks? Would be a hell of a lot better than MasterCard SecureCode or whatever, which as a previous poster has mentioned would simply be seen as 2 passwords to a MiM attack.

ET because sometimes Mastercard and Visa seem to be on a different planet...

2
0
This topic is closed for new posts.