New Ramnit variant seeks to evade two-factor authentication

Share this article:

Once a persistent worm, Ramnit has evolved into a banking trojan capable of injecting victims' web browsers to conduct and conceal fraudulent wire transfers.

The variant uses HTML injection to display subtle changes in banking sites with the hopes of luring users into revealing their one-time passwords (OTP), an additional mode of authentication that is valid for only one login session, according to new findings from security firm Trusteer.

The Ramnit worm was discovered in 2010, but in 2011 researchers spotted a new strain that had incorporated source code from the notorious Zeus banking trojan. Trusteer researchers now classify Ramnit as financial malware.

The fresh variant, which has been targeting banks in the U.K. over the last couple of weeks, waits until users login to their bank accounts before launching the OTP scam, according to Etay Maor, fraud prevention solutions manager at Trusteer.

Victims see a message that they need to configure their OTP service with their bank, while Ramnit initiates a wire transfer to fraudsters without the victim noticing. The user receives the one-time password via SMS, and once they enter it into the web page, Ramnit uses the password to complete the wire transfer to a "money mule" account.

In a Tuesday interview, Maor told SCMagazine.com that Ramnit's browser injection feature is a significant development.

“It's changing the HTML that the user sees,” Maor said. “Why try to hack a bank website that's super secure, when you can attack the victim's computer, which is pretty easy?”

So far, fewer than 10 banks have been targeted in the U.K., Maor said. The malware is still being analyzed, but Maor added that attackers are likely delivering Ramnit to victims via drive-by download, in which they are unknowingly infected simply by visiting a website.

In one incident, Ramnit attackers went as far as to inject their own text into a banking site's "FAQ" section, in case users sought to learn more information about how OTP works.

“The malware uses the same idea of injection [for the] FAQ section," Maor said. "I've never seen so much attention to detail. Usually [fraudsters] are just worried about getting all the information from the user, not covering all the other things." 

Share this article:

Sign up to our newsletters

More in News

Community Health Systems faces lawsuit related to data breach

The suit claims the hospital operator failed to meet security standards to protect the personal information belonging to patients.

Norwegian oil companies targeted in string of attacks

More than 300 companies are being warned to check their systems after at least 50 oil companies confirmed that their systems were attacked.

Possible payment card breach at Dairy Queen stores

Several financial institutions are reporting payment card fraud activity on credit and debit cards used at various Dairy Queen stores around the country, according to Brian Krebs.