7700 Folsom Auburn Rd. Suite 125(916) 987-5474Support@BitWiseComputerRepair.comBitWiseComputersM-F: 9am-6pm Sat: 11am-4pm

Kaspersky Lab Discovers New Online Banking Threat

Post 26 of 112

A New Complex Cyber-Threat Designed to Monitor Online Banking Accounts

Kaspersky Lab announces the discovery of ‘Gauss’, a new cyber-threat targeting users in the Middle East. Gauss is a complex, nation-state sponsored cyber-espionage toolkit designed to steal sensitive data, with a specific focus on browser passwords, online banking account credentials, cookies, and specific configurations of infected machines.

The online banking Trojan functionality found in Gauss is a unique characteristic that was not found in any previously known cyber-weapons.

Gauss was discovered during the course of the ongoing effort initiated by the International Telecommunication Union (ITU), following the discovery of Flame. The effort is aimed at mitigating the risks posed by cyber-weapons, which is a key component in achieving the overall objective of global cyber-peace.

ITU, with expertise provided by Kaspersky Lab, is taking important steps to strengthen global cyber-security by actively collaborating with all relevant stakeholders such as governments, the private sector, international organizations and civil society, in addition to its key partners within the ITU-IMPACT initiative.

Kaspersky Lab’s experts discovered Gauss by identifying commonalities the malicious program share with Flame. These include similar architectural platforms, module structures, code bases and means of communication with command & control (C&C) servers.

Quick facts:

  • Analysis indicates that Gauss began operations in the September 2011 timeframe.
  • It was first discovered in June 2012, resulting from the knowledge gained by the in-depth analysis and research conducted on the Flame malware.
  • This discovery was made possible due to strong resemblances and correlations between Flame and Gauss.
  • The Gauss C&C infrastructure was shutdown in July 2012 shortly after its discovery. Currently the malware is in a dormant state, waiting for its C&C servers to become active.
  • Since late May 2012, more than 2,500 infections were recorded by Kaspersky Lab’s cloud-based security system, with the estimated total number of victims of Gauss probably being in the tens of thousands. This number is lower compared to the case of Stuxnet but it’s significantly higher than the number of attacks in Flame and Duqu.
  • Gauss steals detailed information about infected PCs including browser history, cookies, passwords, and system configurations. It is also capable of stealing access credentials for various online banking systems and payment methods.
  • Analysis of Gauss shows it was designed to steal data from several Lebanese banks including the Bank of Beirut, EBLF, BlomBank, ByblosBank, FransaBank and Credit Libanais. In addition, it targets users of Citibank and PayPal.

Source: Kaspersky

, ,

Menu