Brazilian 'bolware' gang targeted $3.75B in transactions, RSA finds

Share this article:
Brazilian 'bolware' gang targeted $3.75B in transactions, RSA finds
Brazilian 'bolware' gang targeted $3.75B in transactions, RSA finds

While the financial sector in Brazil continues to wrestle with “bolware” attacks – malware targeting a popular payment method in the country called “Boleto,” new findings on a fraud ring furthering the schemes have surfaced.

On Wednesday, RSA released a report uncovering the extent of one gang's exploits. According to the security firm, over a two-year period, a bolware fraud ring may have compromised 495,753 Boletos transactions, which are estimated to be worth up to $3.75 billion.

RSA added that it could not determine how many Boletos were actually paid out by victims, or whether hijacked transactions were successfully carried out in all cases – but that “fraudsters behind this operation may have had the potential to cash out these modified Boletos,” that could account for losses in the billions.

Boletos issued online essentially allow consumers to make electronic payments to merchants, whether for bills, taxes, or a variety of other purposes. Bolware targeting such transactions have been seen in the wild since late 2012, but RSA's findings revealed the extent of the attacks, as well as other discoveries, like the number of compromised computers and email credentials stolen by the malware.

Boleto attackers target Windows PCs running three browsers: Chrome, Firefox and Internet Explorer. Using a man-in-the-browser (MitB) attack, the malware is able to modify Boleto information so that funds are instead redirected to mule accounts set up by attackers, the report said.

RSA detected that 192,227 computers were compromised by bolware, and that over 83,000 email credentials were hijacked by the malware. In addition, 34 banks were impacted the fraud ring, which has devised 19 bolware variants over time.

On Wednesday, Avivah Litan, vice president and distinguished analyst at research firm Gartner, told that bolware uses an IFRAME which hides the fraudulent transaction from bank customers.

“It overrides the transfer and works behind the scenes,” Litan said. “It puts up an iFrame and it hides what it's doing from the consumer, changing the destination account.”

Page 1 of 2
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters


More in News

Email promises free pizza, ensnares victims in Asprox botnet instead

Email promises free pizza, ensnares victims in Asprox ...

Cloudmark came upon an email that offers free pizza, but clicking on the link to get the coupon ends with victims being ensnared in a botnet.

Report: most orgs lacking in response team, policies to address cyber incidents

In its Q3 threat intelligence report, Solutionary learned that 75 percent of organizations it assisted had no response team or policies and procedures to address cyber incidents.

Flash redirect campaign impacts Carnegie Mellon page, leads to Angler EK

Flash redirect campaign impacts Carnegie Mellon page, leads ...

Malwarebytes found that, since early July, thousands of sites had been targeted in the campaign.