New data-theft attack technique can run across web

Share this article:

Researchers have detected a "new man-in-the-browser" (MITB) attack method that uses malware capable of stealing users bank or other sensitive information entered on websites.

As opposed to traditional MITB scams – where malware sitting on victims' computers is used to monitor a list of targeted websites and then pounces when users visit those sites – this technique allows criminals to draw victims' data from an unlimited pool of sites.

Trusteer discovered the threat in late August and posted a blog this week that details the scam.

George Tubin, senior security strategist at Trusteer, told SCMagazine.com on Wednesday that malware used in what the company dubbed "universal" MITB attacks pinpoints desired information, like credit card numbers, entered on any website -- and processes it immediately, rather than afterward, as in a traditional MITB scenario.

When using this new attack method, fraudsters don't have to parse through huge amounts of data or text collected over time, which leaves victims less opportunity to change their credit card details, passwords or other captured information.

“It doesn't matter what websites [victims] go to, it only matters if they use their credit card,” Tubin said. “The likelihood of success is significantly higher using this type of technique versus the traditional man-in-the-browser. When they get the card information, it's going to be fresher information.”

Trusteer researchers have not spotted many incidents of this technique being used, as it is still emerging, but did provide a video used by cyber criminals to market the attack method.

Zeus and SpyEye are examples of crimeware kits used in the universal MITB attacks. The malware often is loaded onto victims' machines through common phishing tactics or by taking advantage of unpatched browser vulnerabilities in drive-by download attacks.

“Browser security has never been done properly,” Tom Kellermann, vice president of cyber security at anti-virus firm Trend Micro, told SCMagazine.com on Wednesday. “[Attackers] are creating modules that fully automate the MITB process you used to have to do manually.”

In June, Trend Micro researchers released a report on a new technique, called an “automatic transfer system” (ATS), being used to commit financial fraud. This also was used to launch MITB attacks and to instantly intercept users' login details, while going undetected by victims.

Share this article:

Sign up to our newsletters

More in News

Instagram iOS and Android apps vulnerable to session hijacking

Two researchers wrote about the Instagram app for iOS and Android is vulnerable to session hijacking because both send unsecured information through HTTP.

Report: Hackers stole data from Israeli defense firms

A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.

Neverquest trojan targets regional banks in Japan

Symantec researchers found a new variant of the banking trojan.