Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity
    • Mobile
    • Networking

    New Android Malware Better at Targeting Bank Transactions

    Written by

    eweekdev
    Published July 10, 2012
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      By: Robert Lemos

      Online criminals continue to improve their tactics for stealing money from banks and their customers. The evolving attacks now include more sophisticated Android malware that aims to capture the secret codes sent by banks to their customers to validate money transfers, according to a July 10 blog post by secure Web provider Trusteer.

      As part of their evolving capabilities, underground developers have added ways to steal information-ranging from mobile devices, known as man-in-the-mobile attacks, to popular crime toolkits, such as a Zeus and SpyEye. The toolkits are the most popular way to create attacks on financial customers, manage criminal operations and steal money. Earlier this summer, a criminal group added man-in-the-mobile capabilities to a third framework, known as Tatanga, the company says.

      In addition, online thieves have customized the attacks to target financial institutions in a variety of European countries, such as Germany, the Netherlands, Portugal and Spain.

      The attacks are specifically designed to get around the additional security adopted by some banks: the communication of a secret code to a customer’s phone to validate large transactions. And, because Android has captured some 60 percent of the European marketplace, it has become a major target, said George Tubin, senior security strategist for Trusteer.

      “What we see over time is that fraudsters continue to adapt, and as financial institutions put in more fraud controls, it is just a matter of time before the fraudsters figure out a way around it,” said Tubin.

      Many banks use text messaging as a second communications channel to the customer. When a large transaction is sent to the bank, the institution attempts to confirm the transaction. A man-in-the-mobile attack (MitMo) is a malicious application that runs in the background and intercepts text messages and other communications to allow attackers to confirm transactions and to prevent the victims from discovering the fraud until it is too late.

      “This enables the criminals to initiate fraudulent transfers and capture the security codes needed to bypass out-of-band authorization systems used by many European banks,” according to the Trusteer blog post.

      In many cases, criminals using Zeus and SpyEye have targeted small businesses, stealing hundreds of thousands of dollars from their accounts. Businesses should attempt to minimize the likelihood that criminals can get control of a computer that connects to a bank. Using a system solely for financial transactions and minimizing the number of people with access to the system are two good ways to reduce the chance of a financially crippling attack.

      Consumers should educate themselves as to the threat and only download applications from the official Android marketplace, Google Play, or another trusted source. Since the application installation process can be started by clicking on a link, users should avoid tapping on unknown links sent in text messages, through social networks and by email.

      Attacks targeting Android are a tiny fraction of attacks on PC systems, but they are growing. Trusteer’s Tubin expects that growth to continue, especially if banks continue to use mobile devices as a second way of securing online transactions.

      “The criminals are business people, and they will spend their time on what will make them money,” said Tubin. “So if they find that this is something that works, you will see a bigger push into the Android device.”

      eweekdev
      eweekdev
      https://www.eweek.com

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.