New cyber threat tracks online banking
SECURITY| Aug. 9, 2012, 8:25 p.m.
Kaspersky Lab has announced the discovery of ‘Gauss’, a new cyber-threat targeting users in the Middle East. Gauss is a complex, nation-state sponsored cyber-espionage toolkit designed to steal sensitive data, with a specific focus on browser passwords, online banking account credentials, cookies, and specific configurations of infected machines.
The online banking Trojan functionality found in Gauss is a unique characteristic that was not found in any previously known cyber-weapons.
Gauss was discovered during the course of the ongoing effort initiated by the ITU following the discovery of Flame. The effort is aimed at mitigating the risks posed by cyber-weapons, which is a key component in achieving the overall objective of global cyber-peace.
ITU, with expertise provided by Kaspersky Lab, is taking important steps to strengthen global cyber-security by actively collaborating with all relevant stakeholders such as governments, the private sector, international organizations and civil society, in addition to its key partners within the ITU-IMPACT initiative.
Kaspersky Lab’s experts discovered Gauss by identifying commonalities the malicious program share with Flame. These include similar architectural platforms, module structures, code bases and means of communication with command & control (C&C) servers.
Analysis indicates that Gauss began operations in the September 2011 timeframe. It was first discovered in June 2012, resulting from the knowledge gained by the in-depth analysis and research conducted on the Flame malware.
The Gauss C&C infrastructure was shutdown in July 2012 shortly after its discovery. Currently the malware is in a dormant state, waiting for its C&C servers to become active.
Since late May 2012, more than 2,500 infections were recorded by Kaspersky Lab’s cloud-based security system, with the estimated total number of victims of Gauss probably being in the tens of thousands. This number is lower compared to the case of Stuxnet but it’s significantly higher than the number of attacks in Flame and Duqu.
Gauss steals detailed information about infected PCs including browser history, cookies, passwords, and system configurations. It is also capable of stealing access credentials for various online banking systems and payment methods.
Analysis of Gauss shows it was designed to steal data from several Lebanese banks including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.
Another key feature of Gauss is the ability to infect USB thumb drives, using the same LNK vulnerability that was previously used in Stuxnet and Flame. At the same time, the process of infecting USB sticks is more intelligent. Gauss is capable of “disinfecting” the drive under certain circumstances, and uses the removable media to store collected information in a hidden file. Another activity of the Trojan is the installation of a special font called Palida Narrow, and the purpose of this action is still unknown.
Alexander Gostev, Chief Security Expert, Kaspersky Lab, commented: “Gauss bears striking resemblances to Flame, such as its design and code base, which enabled us to discover the malicious program. Similar to Flame and Duqu, Gauss is a complex cyber-espionage toolkit, with its design emphasizing stealth and secrecy; however, its purpose was different to Flame or Duqu. Gauss targets multiple users in select countries to steal large amounts of data, with a specific focus on banking and financial information.”
MORE SECURITY NEWS
Cisco report predicts next generation of ransomwareCisco’s 2016 Midyear Cybersecurity Report predicts the next generation of ransomware and new tactics emerging to maximise profit. Read More
Arbor Networks releases global DDoS attack data for first half of 2016Arbor Networks Inc., the security division of NETSCOUT, has released global distributed denial-of-service (DDoS) attack data for the first six months of 2016, which shows a continuing escalation in both the size and frequency of attacks. Read More
F5 introduces standalone security products to defend against targeted attacksF5 DDoS Hybrid Defender provides superior infrastructure protection by combining multilayered DDoS defence across network, session, and application layers. Read More
Ethical Hacking students can’t get a heck of a jobBotswana ethical hacking students report that they are failing to break into the local job market. Read More
Pokémon GO: Sophos warns against malicious copycatsResearchers at IT security company Sophos have warned mobile users to be cautious when downloading augmented reality (AR) mobile games. Read More
New PCI multifactor authentication rules: Is it too late?The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data. Read More
Web apps, a leading cause of security breachesWeb applications are the leading cause of security incidents for financial services, according to the 2016 Verizon Data Breach Investigation Report; this is up from 31 percent from last year’s report. Read More
Analyst firm Ovum publishes SWOT analysis of Arbor Networks Spectrum v2.1Arbor Networks has announced that leading global telecoms analyst firm, Ovum, had published a strengths, weaknesses, opportunities and threats (SWOT) analysis of version 2.1 of Arbor Networks Spectrum. Read More
New RSA Via solution innovations strengthen identity assurance and governanceRSA, The Security Division of EMC, has announced new, innovative identity assurance and identity governance capabilities in RSA Via, designed to help organisations effectively balance security and user convenience as they assure identities and better govern and manage privileged access. Read More
FEATURED STORYFirst-ever Africa Barclays Accelerator programme concludes
Ten fintech companies have concluded the first-ever Barclays Accelerator, powered by Techstars in Africa.
BEST READ NEWS
IN DEPTHEthical Hacking students can’t get a heck of a job
Botswana ethical hacking students report that they are failing to break into the local job market.