Warning! New Keylogging Trojan on the loose! (Federalpolice)

hevnsnt

Lifer
Mar 18, 2000
10,868
1
0
Phishing Scam Installs Keylogger Via Web Page Security
In a sign of the growing diversity of phishing scams, a new e-mail combines social engineering tricks and HTML coding to defraud victims using a keylogging program that attempts to capture banking usernames and passwords.
The latest scam, documented at Codefish Spamwatch, operates via an email with the subject "Police investigation."

Hello...

It has come to my attention that you are being under the police investigation.
Is that true? Have you really commited such crimes?

Please read the following article located at:

http://federalpolice.com:article872@1075686747

or at:

http://0100.035.0255.0133

Sincerely,
Your old friend
The URLs are obscured, and actually point to http://64.29.173.91 an IP address at the Atlanta ISP Abraxis.net. Concerned e-mail recipients who follow the link encounter the message "SERVER ERROR 550" - which is actually not a server error at all, but an HTML document containing unseen background code that attempts to download a Trojan written in Java.

If successful, the trojan installs a keylogger program, which monitors the victim's system for a browser window bearing the title of any of a lengthy list of financial institution names, including:


Westpac
Commonwealth
NetBank
Citibank
Bank of America
PayPal
Bank West
CIBC
Scotia Bank
Bank of Montreal
Royal Bank
TD Waterhouse
Wells Fargo
Bank One
SunTrust
Discover Card
Washington Mutual
Wachovia
desjardins
Chase
When a window is opened that matches one of these titles, the trojan starts recording key strokes, stores them to a text file, and uses a built-in email system to send the contents to pentasatan@mail.ru. Port scans of the server being used suggest a compromised Windows box remotely controlled using the Netbus trojan, which appears to connect to an FTP server referring to "Megacrew."

This campaign's combination of social engineering, URL spoofing, a fake web page and auto-downloading trojan illustrates the growing sophistication of phishing attacks. Much like viruses and worms, phishers are now constructing "blended threats" that layer one deception upon another in an effort to trick Internet users into revealing bank account information.

Netcraft has developed a service to help banks and other financial organizations identify sites which may be trying to construct frauds, identity theft and phishing attacks by pretending to be the bank, or are implying that the site has a relationship with the bank when in fact there is none.
 

SaintGRW

Golden Member
Oct 14, 2001
1,048
0
0
ugh, people actually click those links?

I wouldn't even read that if it showed up in my e-mail it'd just be deleted 1st thing.
 

Scarpozzi

Lifer
Jun 13, 2000
26,392
1,780
126
And you posted ACTUAL links to the trojan, for what reason? You could have just put the URL down and not actually linked it. Someone silly might just click on em. :p
 

flot

Diamond Member
Feb 24, 2000
3,197
0
0
Yes, that is truely advanced.

"Hello I am hearing of your under investigation of national police. Please click on this link and then yes click to install virus."


:disgust:
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Written in JAVA? Gonna have to run THIS through the decompiler upstairs, it sounds HELLACIOUSLY interesting.
 

spidey07

No Lifer
Aug 4, 2000
65,469
5
76
after reading about it that's very clever. Seems pretty dangerous to me.

looks like sophos is catching it though.
 

Scarpozzi

Lifer
Jun 13, 2000
26,392
1,780
126
I logged in on one of my testbed machines (safe network) and ran this to infect the computer. I then scanned the hard drive for virus-type activity and it came back with 3 .class files located within the installation of SUN java that I had run over the browser. AV should pick this up pretty easily cause I'm just using Dr. Web..... Norton and McAfee should nail it as well.

It appears the web is no longer safe to browse without a popup blocker and antivirus program running...
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Originally posted by: Scarpozzi
I logged in on one of my testbed machines (safe network) and ran this to infect the computer. I then scanned the hard drive for virus-type activity and it came back with 3 .class files located within the installation of SUN java that I had run over the browser. AV should pick this up pretty easily cause I'm just using Dr. Web..... Norton and McAfee should nail it as well.

It appears the web is no longer safe to browse without a popup blocker and antivirus program running...

What 3 .class files? Be specific so I can pick this apart.
 

QueHuong

Platinum Member
Nov 21, 2001
2,098
0
0
So it doesn't even ask you if you want to download the java programs, it just does and install automatically as long as someone goes to the website?

And is Firefox susceptible to the automatic download and install?
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Originally posted by: MindStorm
So it doesn't even ask you if you want to download the java programs, it just does and install automatically as long as someone goes to the website?

And is Firefox susceptible to the automatic download and install?
It seems to me that EVERY java-capable browser (On a machine with the Java runtime environment installed) is susceptible. Macs and Linux aren't even an exception in this case.
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Originally posted by: MindStorm
So it doesn't even ask you if you want to download the java programs, it just does and install automatically as long as someone goes to the website?

And is Firefox susceptible to the automatic download and install?
It seems to me that EVERY java-capable browser (On a machine with the Java runtime environment installed) is susceptible. Macs and Linux aren't even an exception in this case.
 

CPA

Elite Member
Nov 19, 2001
30,322
4
0
With the exception of the original email and the password detect, why does this sound a lot like Gator?

1. Go to a website
2. Gator automatically installs
3. Gator gathers and send info on your browsing habits

Isn't this just a natural extension of technology already used?


<-----Not tech savvy, should probably just stick with tax issues :p
 

EyeMWing

Banned
Jun 13, 2003
15,670
1
0
Originally posted by: CPA
With the exception of the original email and the password detect, why does this sound a lot like Gator?

1. Go to a website
2. Gator automatically installs
3. Gator gathers and send info on your browsing habits

Isn't this just a natural extension of technology already used?


<-----Not tech savvy, should probably just stick with tax issues :p

Gator isn't omniplatform and doesn't steal your financial data. Also, if your browser is configured default, it WILL ask to install.
 

CrackaLackaZe

Senior member
Jun 29, 2002
922
0
76
Err...I accidently clicked on one of the links. I was intentionally trying to click on a link in an aim window but misclicked and my cursor landed on one of the links in the page...am I infected now?
 

Ogg

Diamond Member
Sep 5, 2003
4,829
1
0
Originally posted by: CrackaLackaZe
Err...I accidently clicked on one of the links. I was intentionally trying to click on a link in an aim window but misclicked and my cursor landed on one of the links in the page...am I infected now?

hahahahahahahaha
 

Scarpozzi

Lifer
Jun 13, 2000
26,392
1,780
126
Here's a link from the test machine I infected. I went ahead and deleted it, but I may do some port scans and throw it on a hub to do some real packet sniffing and see if there is anything else we can learn of this new exploit. (how often it tries to contact the mothership, etc)
Link