Friday, September 13, 2013
Experts have discovered a new technology attacking users of online banking
Usually, banking Trojans used stored on the target machine configuration files. These files contain the addresses of sites that cyber criminals are planning to attack, and malicious code being introduced to these resources through banking Trojans. In the future, it is with this code, hackers can steal access data and personal information from users.
A similar mechanism of attack uses, and other Trojan Ciavax, the activity of which was seen in August of this year. In this case, even a list of sites on which you plan to organize the attack, kept a secret.
"New technology is making attacks on online banking customers takes advantage of the infamous Trojan ZeuS, but this time the virus writers have managed to advance even further. Now it is impossible to determine which sites, cybercriminals are going to attack. At the same time, verification sampling of Internet addresses manually on the basis of their subject matter, too can be an effective solution, as a large number of requests can attract the attention of intruders, - says Thomas Siebert, an expert antivirus G Data. - The use of new mechanisms for the maintenance of attacks not only complicates the fight against virus writers, but also a sign of the increased professionalism."
To learn more visit http://blog.gdatasoftware.com/blog/article/banking-trojans-disguise-attack-targets-in-the-cloud.html