Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Panda Banker Malware Targeting Banks

The banking Malware known as Panda Banker is now targeting financial institutions. The banking sites in countries like Italy, Canada, Australia, Germany, USA, Japan and the United Kingdom are under attack. Panda banker is a Trojan. A Trojan is another type of malware named after the wooden horse the Greeks used to infiltrate Troy. It is a harmful piece of software that looks legitimate. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.

Also known as Panda Zeus, the malware was first discovered in 2016, based on the leaked source code of the infamous Zeus banking Trojan. The threat has been involved in multiple infection campaigns targeting users worldwide, including an attack that leveraged poisoned Google searches for malware delivery.

Designed to steal user credentials via man-in-the-browser and webinjects that specify what websites to target and how, Panda Banker has received consistent, incremental updates ever since its first appearance on the threat landscape.The Trojan is being sold as a kit on underground forums, meaning that it has a large number of users. Cyber criminals using it target various countries, likely based on their ability to convert the stolen credentials into real money.

Since the beginning of 2016, Panda Banker has been observed in campaigns targeting financial institutions in Italy, Canada, Australia, Germany, the United States, and the United Kingdom, and now in attacks focusing on Japan as well.However, not only does the malware feature webinjects targeting Japan now. Security Reasearchers from Arbor Networks have discovered that none of the Indicators of Compromise (IOC) in this campaign overlaps with IOCs from previous attacks.

For the distribution of the malware, the threat actors behind these attacks used malicious advertisements called Malvertising to redirect victims to the RIG-v exploit kit. The toolkit then attempts to exploit vulnerabilities on the victims’ systems to download and execute the Trojan.

The campaign operators used multiple domains as their command and control (C&C) servers, but only one of them was found to be operational. The domain was registered to a Petrov Vadim using the email address [email protected].As part of the campaign, which the threat actor named ank, twenty seven webinjects were included in Panda Banker, seventeen of which targeted towards baking websites of Japanese origin. The remaining 10 target websites based in the USA:

  • 4 search engines
  • 2 social media sites
  • 1 email site
  • 1 video search engine
  • 1 online shopping site
  • 1 adult content hub.

The webinjects used in this campaign employ the Full Info Grabber Automated Transfer System (ATS) to capture user credentials and account information. According to Arbor Networks, while this was the first time they encountered a Panda Banker variant targeting Japan, the country is no stranger to banking Trojans. Previously, it was hit by attacks that employed the Ursnif and Urlzone financial malware.

The post Panda Banker Malware Targeting Banks appeared first on .



This post first appeared on TEST IF YOUR FACEBOOK INFO WAS SHARED WITH CAMBRIDGE ANALYTICA?, please read the originial post: here

Share the post

Panda Banker Malware Targeting Banks

×

Subscribe to Test If Your Facebook Info Was Shared With Cambridge Analytica?

Get updates delivered right to your inbox!

Thank you for your subscription

×