Beware of trojan malware attack, MeitY warns customers of 27 major banks

[ad_1]

Read More/Less


Ministry of Electronics and Information Technology’s Indian Computer Emergency Response Team (CERT-In) on Tuesday notified that customers of nearly 27 Indian banks including major public and private banks are at the risk of attack from a new banking trojan malware masquerading as income-tax refund related link.

Modus operandi

The victims first receive an SMS link to a phishing website, disguised as the Income Tax Department website, they are then asked to fill in a few personal details before being sent a malicious APK file to be downloaded to complete verification. On opening the app, the victim is asked to grant permissions to access SMS, call logs and contacts.

If the victim doesn’t allow permission to any of these, the same form appears on opening the app asking for data including full name, PAN, Aadhar number, address, date of birth, mobile number, email address and financial details like account number, IFS code, CIF number, debit card number, expiry date, CVV and PIN, the federal cybersecurity agency noted.

Also read: Chinese hackers target UIDAI, Times Group, report says

Once these details are entered, the application states that there is a refund amount that could be transferred to the user’s bank account.

“When the user enters the amount and clicks ‘Transfer’, the application shows an error and demonstrates a fake update screen. While the screen for installing the update is shown, Trojan in the backend sends the user’s details including SMS and call logs to the attacker’s machine,” CERT-In said.

“These details are then used by the attacker to generate the bank specific mobile banking screen and render it on the user’s device. The user is then requested to enter the mobile banking credentials which are captured by the attacker,” it added.

These attacks are likely to jeopardise the privacy and security of sensitive data ultimately resulting in large scale attacks and financial frauds.

Drinik suspected

Claimed to be done using Drinik malware, the earlier version of this malware came in 2016 as a primitive SMS stealer and has recently evolved into a banking trojan demonstrating a phishing screen persuading users to enter sensitive banking information.

“Such trojans have become very common lately. But something like Drinik which has been dormant since 2016 can be tracked easily even using a Google Play Protect. Personally, I haven’t come across any strong active version of this malware recently. Also, consumers need to be wary that any legitimate government website will use ‘.gov.in’ in the link, anything else is not allowed in India for government websites,” Sunny Nehra, Admin, Hacks and Security told BusinessLine.

“These days people blindly give permissions to random apps to access personal data on phones without even thinking if that app really needs access to say your camera, gallery, phone book and so on. It’s good that MeitY is spreading awareness and updating users about such threats,” he added.

Kapil Gupta, Co-founder, Volon Cyber Security said,“Along with Drinik, another new Android malware ‘Elibomi’ has also been targeting taxpayers, luring them by offering tax filing service in a similar way. This malware too is getting delivered by SMS text phishing attack, pretending to come from income tax department. Users are recommended to not click on any unverifiable links from text messages. They should use reliable security application in mobile to protect against malicious applications”

[ad_2]

CLICK HERE TO APPLY

Trojan posing as IT refund skulking to attack Android phone bank customers, BFSI News, ET BFSI

[ad_1]

Read More/Less


A banking Trojan malware has been detected in the Indian cyberspace that is lurking to attack bank customers using Android phones and has already targeted those from more than 27 public and private sector banks, the country’s federal cyber security agency said in a latest advisory.

The phishing (a social engineering computer virus attack to steal personal data) malware is masquerading as an “income tax refund” and it can “effectively jeopardise the privacy of sensitive customer data and result in large-scale attacks and financial frauds”, the CERT-In advisory issued on Tuesday said.

“It has been observed that Indian banking customers are being targeted by a new type of mobile banking campaign using Drinik android malware,” it said.

“Drinik started as a primitive SMS stealer back in year 2016 and has evolved recently to a banking Trojan that demonstrates phishing screen and persuades users to enter sensitive banking information,” it said.

Customers of more than 27 Indian banks including major public and private sector banks have already been targeted by the attackers using this malware, the CERT-In said.

The Indian Computer Emergency Response Team or CERT-In is the federal technology arm to combat cyber attacks and guarding the cyber space against phishing and hacking assaults and similar online attacks.

The advisory describes the attack process.

The victim, it said, receives an SMS containing a link to a phishing website (similar to the website of the Income Tax Department) where they are asked to enter personal information and download and install the malicious APK file in order to complete verification.

“This malicious android app masquerades as the Income Tax Department app and after installation, the app asks the user to grant necessary permissions like SMS, call logs, contacts etc.”

“If the user does not enter any information on the website, the same screen with the form is displayed in the android application and the user is asked to fill in to proceed,” it said.

This data to be filled includes full name, PAN, Aadhaar number, address, date of birth, mobile number, email address and financial details like account number, IFS code, CIF number, debit card number, expiry date, CVV and PIN, it adds.

Once these details are entered by the user, it said, the application states that there is a refund amount that could be transferred to the user’s bank account.

When the user enters the amount and clicks “Transfer”, the application shows an error and demonstrates a fake update screen.

“While the screen for installing update is shown, Trojan in the backend sends the user’s details including SMS and call logs to the attacker’s machine,” it said.

“These details are then used by the attacker to generate the bank specific mobile banking screen and render it on user’s machine. The user is then requested to enter the mobile banking credentials which are captured by the attacker,” it said.

The advisory recommends some counter-measures to guard against such attacks and malware, like always download apps from official app stores, install appropriate Android updates and patches as and when available, use safe browsing tools, do extensive research before clicking on link provided in the message and look out for valid encryption certificates by checking for the green lock in the browser’s address bar before sharing sensitive personal data.

It also asked users to immediately report any unusual activity in their account to their bank and also send a complaint to CERT-In at incident@cert-in.org.in.



[ad_2]

CLICK HERE TO APPLY

Inside a ransomware attack: how dark webs of cybercriminals collaborate to pull one off

[ad_1]

Read More/Less


(The Conversation)

In their Carbis Bay communique, the G7 announced their intention to work together to tackle ransomware groups.

Days later, US President Joe Biden met with Russian President Vladimir Putin, where an extradition process to bring Russian cybercriminals to justice in the US was discussed.

Also read: US has recovered ransom payment made after pipeline hack

Putin reportedly agreed in principle, but insisted that extradition be reciprocal. Time will tell if an extradition treaty can be reached. But if it is, who exactly should extradited – and what for? The problem for law enforcement is that ransomware – a form of malware used to steal organisations’ data and hold it to ransom – is a very slippery fish.

Not only is it a blended crime, including different offences across different bodies of law, but it’s also a crime that straddles the remit of different policing agencies and, in many cases, countries. And there is no one key offender. Ransomware attacks involve a distributed network of different cybercriminals, often unknown to each other to reduce the risk of arrest.

So it’s important to look at these attacks in detail to understand how the US and the G7 might go about tackling the increasing number of ransomware attacks we’ve seen during the pandemic, with at least 128 publicly disclosed incidents taking place globally in May 2021.

What we find when we connect the dots is a professional industry far removed from the organised crime playbook, which seemingly takes its inspiration straight from the pages of a business studies manual.

The ransomware industry is responsible for a huge amount of disruption in today’s world. Not only do these attacks have a crippling economic effect, costing billions of dollars in damage, but the stolen data acquired by attackers can continue to cascade down through the crime chain and fuel other cybercrimes.

Ransomware attacks are also changing. The criminal industry’s business model has shifted towards providing ransomware as a service. This means operators provide the malicious software, manage the extortion and payment systems and manage the reputation of the “brand”. But to reduce their exposure to the risk of arrest, they recruit affiliates on generous commissions to use their software to launch attacks.

This has resulted in an extensive distribution of criminal labour, where the people who own the malware are not necessarily the same as those who plan or execute ransomware attacks. To complicate things further, both are assisted in committing their crimes by services offered by the wider cybercrime ecosystem.

How do ransomware attacks work? There are several stages to a ransomware attack, which I have teased out after analysing over 4,000 attacks from between 2012 and 2021.

First, there’s the reconnaissance, where criminals identify potential victims and access points to their networks. This is followed by a hacker gaining “initial access”, using log-in credentials bought on the dark web or obtained through deception.

Once initial access is gained, attackers seek to escalate their access privileges, allowing them to search for key organisational data that will cause the victim the most pain when stolen and held to ransom. This is why hospital medical records and police records are often the target of ransomware attacks. This key data is then extracted and saved by criminals – all before any ransomware is installed and activated.

Next comes the victim organisation’s first sign that they’ve been attacked: the ransomware is deployed, locking organisations from their key data. The victim is quickly named and shamed via the ransomware gang’s leak website, located on the dark web. That “press release” may also feature threats to share stolen sensitive data, with the aim of frightening the victim into paying the ransom demand.

Successful ransomware attacks see the ransom paid in cryptocurrency, which is difficult to trace, and converted and laundered into fiat currency. Cybercriminals often invest the proceeds to enhance their capabilities – and to pay affiliates – so they don’t get caught.

The cybercrime ecosystem

While it’s feasible that a suitably skilled offender could perform each of the functions, it’s highly unlikely. To reduce the risk of being caught, offender groups tend to develop and master specialist skills for different stages of an attack. These groups benefit from this inter-dependency, as it offsets criminal liability at each stage.

And there are plenty of specialisations in the cybercrime underworld. There are spammers, who hire out spamware-as-a-service software that phishers, scammers, and fraudsters use to steal people’s credentials, and databrokers who trade these stolen details on the dark web.

Also read: Data breaches on the rise in 2021: Report

They might be purchased by “initial access brokers”, who specialise in gaining initial entry to computer systems before selling on those access details to would-be ransomware attackers. These attackers often engage with crimeware-as-a-service brokers, who hire out ransomware-as-a-service software as well as other malicious malware.

To coordinate these groups, darkmarketeers provide online markets where criminals can openly sell or trade services, usually via the Tor network on the dark web. Monetisers are there to launder cryptocurrency and turn it into fiat currency, while negotiators, representing both victim and offender, are hired to settle the ransom amount.

This ecosystem is constantly evolving. For example, a recent development has been the emergence of the “ransomware consultant”, who collects a fee for advising offenders at key stages of an attack.

Arresting offenders

Governments and law enforcement agencies appear to be ramping up their efforts to tackle ransomware offenders, following a year blighted by their continued attacks.

As the G7 met in Cornwall in June 2021, Ukrainian and South Korean police forces coordinated to arrest elements of the infamous CL0P ransomware gang. In the same week, Russian national Oleg Koshkin was convicted by a US court for running a malware encryption service that criminal groups use to perform cyberattacks without being detected by antivirus solutions.

While these developments are promising, ransomware attacks are a complex crime involving a distributed network of offenders. As the offenders have honed their methods, law enforcers and cybersecurity experts have tried to keep pace.

But the relative inflexibility of policing arrangements, and the lack of a key offender (Mr or Mrs Big) to arrest, may always keep them one step behind the cybercriminals – even if an extradition treaty is struck between the US and Russia.

[ad_2]

CLICK HERE TO APPLY

Indian national sentenced to three years in US federal prison for call centre fraud

[ad_1]

Read More/Less


An Indian national from Gurugram has been sentenced to three years in federal imprisonment on charges of call centre fraud that intended to cheat Americans of millions of dollars, a US attorney said.

Sahil Narang, 29, who was in the United States illegally at the time of his arrest in May 2019, is described in court documents as a key participant in a sophisticated so-called Tech Fraud and Refund Fraud online telemarketing schemes that targeted technologically unsophisticated computer users, usually senior citizens.

Narang had pleaded guilty on December 11, 2020, to conspiracy to commit wire fraud and 10 counts of wire fraud. He was sentenced on Wednesday to 36 months in federal prison to be followed by three years of supervised release, said the Acting United States Attorney Richard B Myrus.

According to federal prosecutors, Internet pop-up advertisements were used in the Tech Fraud scheme to deceive computer users into believing that they needed computer protection services.

The pop-up ads provided a telephone number to call and when the victims dialled the number, they were routed to call centre operators who perpetuated the lie that malware had been detected on the victims’ computers. They offered the victims supposed computer protection services at exaggerated prices.

In the Refund Fraud scheme, call centre operators telephoned those who had fallen prey to the Tech Fraud and offered to refund the sum previously paid.

Through manipulation that usually involved the display of false bank account balances on the customers’ computer screens, the operators convinced the victims that sums far in excess of the refund amount had accidentally been deposited into the victims’ accounts.

As the victims had not in fact received any money, those who “returned” money were actually sending more of their own money to the fraudsters, federal prosecutors said.

According to information presented to the court, Narang and others worked together to manipulate thousands of callers employing the Tech Fraud scheme, seeking to obtain from them an estimated $1.5 million to $3 million.

An FBI investigation determined that over a nine-month period Narang routed on average more than 70 calls to call centres every day. It is also estimated that Narang’s Tech Fraud scheme was successful 30 per cent of the time.

In round two of the scheme, the Refund Fraud scheme, executed during the same nine-month period, Narang and others associated with call centres sought to obtain from their victims cumulatively $560,900.

The FBI investigation identified at least nine individuals who fell victim to the Tech Fraud Scheme at a total loss of $110,900, which the FBI was able to intercept and return to the victims. During the investigation, the FBI interceded and prevented loss when a tenth victim was on the verge of losing up to $450,000 to the fraudsters.

[ad_2]

CLICK HERE TO APPLY