GozNym banking malware spotted now in Europe

GozNym now using redirection attacks.
GozNym now using redirection attacks.

IBM's X-Force reported today the actors behind the hybrid GozNym banking trojan have released a new configuration that is targeting European banks with the new angle of using redirection attacks.

The recent targets include 17 Polish banks and one in Portugal. However, a new twist has been included, using redirection attacks targeted at customers using these banking insititutions. IBM reported the GozNym gang have created about 200 URLs that point a victim to what they believe is their bank website, but in fact it is one controlled by the bad guys.

“By keeping the victim away from the bank's site, the fraudster can deceive them into divulging critical authentication codes on the replica site, all without the bank knowing that the customer's session has been compromised,” said Limor Kessem, executive security advisor at IBM.

Kessem believes the Dridex gang is behind the GozNym attacks as it is the only cybergang known to use redirection attacks, although, she added, rumors have the Neverquest organization also implementing redirection attacks.

IBM noted that most of these attacks start with a phishing attack that includes a malware laden attachment.

A specific amount of money lost in Europe has not yet been reported, but Kessem expects GozNym to grow into a major threat to financial institutions with more direct attacks and redirection schemes.

The original version of GozNym first struck in early April, but by April 14 it had already stolen an estimated $4 million from 24 banks, 22 in the U.S. and two in Canada. GozNym was created by combining some of the source code from the older Nymaim and Gozi IFSB banking malware to create an even more dangerous piece of software.

You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS