Showing posts with label Thieves money.. Show all posts
Showing posts with label Thieves money.. Show all posts

Thursday 20 November 2014

Thieves money.

Various types of malicious programs often terrorize Internet users. The virus is classified as very dangerous because it can drain the contents of the victim's account.

Virus 'thief money' life has been discovered a few years ago, but gradually becoming more sophisticated malicious programs until it is feared could lead to huge losses.

Drug to counteract some of the virus had been found. But cyber criminals are not losing my mind, they are often modified with the latest techniques in order to successfully pass the various protection systems.

According to JD Sherry, Global Director of Technology and Solutions Trend Micro, there are at least six internet banking virus that is dangerous to the present, and it still could cost quite a bit.

Virus 'thief money' which, according to Trend Micro warrant concern are as follows:

Citadel.

In the ancient Citadel are used as a last defense of a kingdom. Hence, typically form large, sturdy, and comes with a variety of weapons systems.

In modern times it is in the name Citadel pincers cyber criminals to name a virulent virus. The virus specifically designed to drain the victim's account.

Citadel is a virus that is created from the source code of Zeus, one of the viruses that are also quite sophisticated. The difference Citadel is made specifically to attack internet banking.

The virus is found in the Citadel began in January 2012 and, since then a malicious program is constantly being developed to reach their latest version in October 2013. Until now, the virus is thought to still circulate freely.

Tinba.

One observer virus named Amit Klein wrote many stories about Tinba on his personal blog. This is one of the viruses attacker who should be wary of internet banking.

Tinba emerged from the underground hacker community about 9 months ago. This malware is designed to steal money.

Originally methods used Tinba still relatively unusual, even to say a little bit old school compared with viruses like. But in January 2013 found a new version Tinba more sophisticated, able to outsmart even the two-way authentication system of the bank.

"When the victim accessing their bank pages, Tinba will display a page that is very similar to the bank," writes Klein.

However, when trying to log into the page, the user is actually displayed error pages. This is where the process starts data theft.

Eurograbber.

In accordance with its name. The virus is designed to drain money internet banking users in Europe, even until the end of 2012 and at least 36 million euros ($ 455 billion) were successful in the brush of the virus.

Eurograbber first discovered by a security agency named Check Point Software Technologies, then assisted also by other institutions of Israel named Versafe. They say that these malicious programs designed to attack the banking sector.

In operation the virus was not only attacked by a computer, but also infiltrated into the smart phone of the victim. Having successfully entered, it will download some application components to be able to act.

Eurograbber first discovered in Italy, then spread to several areas of Europe such as Germany, the Netherlands and Spain. At least there are thousands of victims from 30 different banks that successfully infected by the virus.

SpyEye

Analysis and Guardian and McAfee announced the discovery of a new virus called SpyEye. It is said that these malicious programs created by programmers who know well about the working system of internet banking.

Just like the Citadel, SpyEye is based on the source code of Zeus. It's just the program to attack a specific target, such as corporate transactions, or users who have savings are numerous.

SpyEye said to be great because it managed to avoid the various protection systems. In fact, the virus is said to be relatively ingenious, it was difficult to detect when a transaction takes place.

"They know how to make the transaction as if it occurred. Obviously, these people (the author-ed) to know more than just the understanding of Internet banking," said David Marcus, director of Advanced Research and Threat Intelligence McAfee, as quoted of CRN.

Gozi-Prinimalka.

If Eurograbber attacking the banking system, then Gozi-Prinimalka made to beat the internet banking system in the United States.

Trend Micro managed to capture and analyze Gozi-Prinimalka, after the surgery turns out this malicious program has several unique among similar applications.

To steal information from its victims, the virus will first create a backdoor using exploits Java Script. There are two backdoor to be made, and BKDR_URSNIF.DN BKDR_URSNIF.B both are connected in real time to the control system of the virus.

The data stolen this virus was not only stored on the hard drive, but also temporary memory that is stored in the browser.

In America this virus at least have made a restless three banking institutions, they are TDBank, Firstrade, Options Xpress. The trio then make improvements to the system to fend off the attack.

High Roller.

The virus is spread pretty much the last terror is the High Roller. It is said that this is one of the biggest attacks in the banking industry world.

Unlike other malicious programs that only attack by stealth, launch a High Roller can blindly from various directions.

The virus is more difficult to track because they do not have the Command Center in a physical form. Performers are smart enough to make this control system in the 'cloud', making it difficult to track.

Basically the High Roller is made of a combination of Zeus and SpyEye virus, and in it there are also some conventional information theft techniques that are common in cyberspace.

Advanced technology owned by High Roller makes it quite difficult suppressed, even to this day. Therefore, the entire banking sector are advised to remain vigilant.

"By using a cloud system, the High Roller has a new attack techniques. They are difficult to analyze and difficult to detect its presence," said Chris Silveira, Manager of Fraud Intelligence of Guardian Analytics.
Thank you for reading this article. Written and posted by Bambang Sunarno. sunarnobambang86@gmail.com
author:
http://schema.org/Personal.
https://plus.google.com/105319704331231770941.
Name: Bambang Sunarno.
http://www.primadonablog.blogspot.com/2014/11/thieves-money.html
DatePublished: November 20, 2014 at 13:16
Tag : Thieves money.
Code : 7MHPNPADAEFW

Posted by: Bambang Sunarno
www.Primo.com Updated at: 13:16