Facebook Users' Credit Card Data at Risk From New Trojan
New Zeus version injects rogue debit card-related offers into popular websites.
The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo -- offering rebates and new security measures.Amit KleinCTO, Trusteer
A new variant of the Zeus trojan tricks users into exposing their debit card details by displaying rogue offers when they visit Facebook, Gmail, Yahoo and Hotmail, according to researchers from security firm Trusteer.
"We've recently discovered a series of attacks being carried out by a P2P [peer-to-peer] variant of the Zeus platform against some of the Internet's leading online services and websites," Trusteer CTO Amit Klein said in a blog post. "The attacks are targeting users of Facebook, Google Mail, Hotmail and Yahoo -- offering rebates and new security measures."
Like most financial malware, Zeus has the ability to inject malicious content into browsing sessions. This functionality is commonly used to display rogue Web forms when users visit online banking websites.
In a similar fashion, the new Zeus variant analyzed by Trusteer exploits the trust relationship between users and well-known service providers to achieve its goals, Klein said.
When victims visit Facebook, the malware displays a fake offer for getting 20% cash back when buying Facebook Credits with a MasterCard or Visa debit card. The users are asked to link their cards with their Facebook accounts, a process that involves exposing their card's details.
Like most financial malware, Zeus has the ability to inject malicious content into browsing sessions.
On Gmail and Yahoo, the malware offers free enrollment into a new secure payment processing system allegedly supported by 3,000 online shops and developed in partnership with Visa and MasterCard.
On Hotmail, the malware preys on fears of credit card fraud by offering users to sign up for a free debit card protection service similar to 3D Secure, that requires a password to authorize online transactions in addition to the card's security code.
"This attack is a clever example of how fraudsters are using trusted brands -- social network/email service providers and debit card providers -- to get victims to put down their guard and surrender their debit card information," Klein said. "These webinjects are well-crafted both from a visual and content perspective, making it difficult to identify them as a fraud."
While the buzz around big data analysis is at a peak, there is less discussion about how to get the necessary data into the systems in the first place, which can involve the cumbersome task of setting up and maintaining a number of data processing pipelines.
Next-generation endpoint protection vendor SentinelOne has received the same certification that many traditional antivirus platforms seek, meaning it can be considered suitable for meeting certain requirements of industry and governmental regulations.
Smartphone sales increased substantially in the second quarter of 2015, but the rate of growth continued to slow, fueling concerns that the market has started to become saturated, according to a study released today by Juniper Research.
Attackers could exploit a new vulnerability in BIND, the most popular Domain Name System (DNS) server software, to disrupt the Internet for many users.