New cyber threat tracks online banking
SECURITY| Aug. 9, 2012, 8:25 p.m.
Kaspersky Lab has announced the discovery of ‘Gauss’, a new cyber-threat targeting users in the Middle East. Gauss is a complex, nation-state sponsored cyber-espionage toolkit designed to steal sensitive data, with a specific focus on browser passwords, online banking account credentials, cookies, and specific configurations of infected machines.
The online banking Trojan functionality found in Gauss is a unique characteristic that was not found in any previously known cyber-weapons.
Gauss was discovered during the course of the ongoing effort initiated by the ITU following the discovery of Flame. The effort is aimed at mitigating the risks posed by cyber-weapons, which is a key component in achieving the overall objective of global cyber-peace.
ITU, with expertise provided by Kaspersky Lab, is taking important steps to strengthen global cyber-security by actively collaborating with all relevant stakeholders such as governments, the private sector, international organizations and civil society, in addition to its key partners within the ITU-IMPACT initiative.
Kaspersky Lab’s experts discovered Gauss by identifying commonalities the malicious program share with Flame. These include similar architectural platforms, module structures, code bases and means of communication with command & control (C&C) servers.
Analysis indicates that Gauss began operations in the September 2011 timeframe. It was first discovered in June 2012, resulting from the knowledge gained by the in-depth analysis and research conducted on the Flame malware.
The Gauss C&C infrastructure was shutdown in July 2012 shortly after its discovery. Currently the malware is in a dormant state, waiting for its C&C servers to become active.
Since late May 2012, more than 2,500 infections were recorded by Kaspersky Lab’s cloud-based security system, with the estimated total number of victims of Gauss probably being in the tens of thousands. This number is lower compared to the case of Stuxnet but it’s significantly higher than the number of attacks in Flame and Duqu.
Gauss steals detailed information about infected PCs including browser history, cookies, passwords, and system configurations. It is also capable of stealing access credentials for various online banking systems and payment methods.
Analysis of Gauss shows it was designed to steal data from several Lebanese banks including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.
Another key feature of Gauss is the ability to infect USB thumb drives, using the same LNK vulnerability that was previously used in Stuxnet and Flame. At the same time, the process of infecting USB sticks is more intelligent. Gauss is capable of “disinfecting” the drive under certain circumstances, and uses the removable media to store collected information in a hidden file. Another activity of the Trojan is the installation of a special font called Palida Narrow, and the purpose of this action is still unknown.
Alexander Gostev, Chief Security Expert, Kaspersky Lab, commented: “Gauss bears striking resemblances to Flame, such as its design and code base, which enabled us to discover the malicious program. Similar to Flame and Duqu, Gauss is a complex cyber-espionage toolkit, with its design emphasizing stealth and secrecy; however, its purpose was different to Flame or Duqu. Gauss targets multiple users in select countries to steal large amounts of data, with a specific focus on banking and financial information.”
MORE SECURITY NEWS
Kaspersky Lab: Emerging Threats in the APT World - Predictions for 2015Kaspersky Lab experts have released a list of the top emerging threats in the APT world. Read More
“Visibility Void” represents potential threat to enterprisesCompanies must stay on top of a growing pool of cyber-threats says Andrew Potgieter, security solutions director at Westcon. Read More
The hackers’ bounty - how much do cybercriminals make from innocent users?Cybercriminals could be raking in profits 20 times greater than the cost of their attacks, according to figures compiled by Kaspersky Lab experts. Read More
Regin: a malicious platform capable of spying on GSM networksKaspersky Lab’s Global Research and Analysis Team has published its research on Regin – the first cyber-attack platform known to penetrate and monitor GSM networks in addition to other “standard” spying tasks. Read More
Security a top priority as Africa moves to LTESecuring the network is a top priority for telcos and carriers as LTE becomes increasingly mainstream across Africa, says Fortinet. Read More
Barclays ropes in ICT taskforce in anti-fraud warBarclays Bank of Botswana (BBB) has roped in experts in the field of Information Technology and cybercrime to give weight to its annual fraud awareness month. Read More
Kaspersky Lab: Most businesses use third-party services to manage virtualisationLess than one-third of businesses keep their virtualisation servers on-premises and managed entirely by their own internal IT staff, according to a Kaspersky Lab survey of 3,900 IT professionals worldwide. Read More
Cisco: Employee complacency increases riskResearch released by Cisco shows that critical company data is at risk in South Africa as a result of organisations focusing IT security policies and resources more on external threats and not enough on the threat from within. Read More
FEATURED STORYPWC: Optimism abounds but a bumpy journey ahead for some
PwC’s ‘Capital Projects & infrastructure in East Africa, Southern Africa and West Africa,’ report says infrastructure spend in the region is projected to reach $180bn per annum by 2025.
BEST READ NEWS
IN DEPTHAfrica lags on digital migration
Only three African countries have so far completed the digital migration process, and serious issues are hampering the migration in other nations.