Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in your inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
Go
-->

Trojan ZeuS Employed for Compromising Japanese Online Banking Users; Symantec

The infamous banker Trojan namely ZeuS was recently spotted during multiple assaults targeting fresh consumers, who conducted Internet banking operations, within a scam that was attributed to the mechanized exploit kit called BlackHole. The Trojan that's behind severe hazards to banking clients across USA and Europe was lately spotted in Japan, informs the National Police Agency. However, till so far, ZeuS apparently could little affect Japanese banking clients, state researchers from Symantec the security company.

According to this organization, authorities in Japan likely picked the gauntlet vis-à-vis the malware creators in effectively keeping ZeuS off the nation's Internauts for the prolonged period thus far. Indeed, it was during 2009 that ZeuS' detection first occurred after which assaults started rising through 2010. The most recent version of ZeuS is inflicting 5 prominent banks inside Japan, with the attacks seemingly resembling the previous versions, Symantec notes.

The working of the Trojan remains the same except that it is devised to attack solely Japanese consumers.

Symantec elaborates that soon as ZeuS contaminates a PC, it tracks the movements of the victims visiting bank websites.

Thus, whenever a victim accesses any bank website, the Trojan inserts one HTML code inside it so a message is exhibited that states in Japanese language that the bank for enhancing customer service is making its online banking system up-to-date therefore the user requires re-submitting the information, which he entered during the first registration.

A request prompts the victim towards supplying information which attackers likely use for gaining admission into the person's Internet banking account. A ZeuS incorporated keystroke logging component records the information the victimized end-user supplies.

Meanwhile, as for the distribution technique, the attackers employ BlackHole for planting the ZeuS malware that's fundamentally the standard method for the threat's dissemination.

Hence, for lessening the lurking danger, security company Symantec urges end-users towards maintaining all running computer programs up-to-date. Also, since the kind of malware can as well infect an end-user's PC via e-mail, one mustn't view attachments or e-mails sent from dubious sources. Lastly, Internet-users must become cautious incase their banking website requests details which aren't normally asked for, Symantec concludes.

Related article: Trojans Attack For Ransom

» SPAMfighter News - 18-02-2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next