Explore the latest news and trends  

Sign up for our weekly security newsletter

Be the first to receive important updates on security


PhishLabs Researchers Intercept Vawtrak a Fresh Variant of Neverquest

PhishLabs the security company has just discovered the infamous banker Trojan Neverquest in some newer variations dubbed Vawtrak which alongside stealing online banking credentials also target certain gaming, retail and social media websites.

Vawtrak has a new capability of injecting additional fields into the infected websites so it can grab sensitive information like PINs while remove its traces off the online traffic it recreates.

Evidently, it has been over a year that the Neverquest malware is into existence for becoming maliciously active on a contaminated PC every time the end-user accesses any pre-programmed target website, normally a banking site till of course lately. A well-known exploit kit Neutrino is used to distribute Neverquest, in addition to other distribution mediums. Now the malware has been recreated as described above, observes PhishLabs.

The security company PhishLabs Threat Intelligence Director Don Jackson states that the latest set of capabilities in Vawtrak have been designed for purging it with bots on the 28th of August 2014 while educing abilities that are at par with other unique bank info-stealing Trojans, so reported softpedia.com in news on September 4, 2014.

The Neverquest variant uses the man-in-the-browser assault method for recreating/modifying data of online traffic, irrespective of whether that data is encrypted for security reasons.

It is quite clear that Vawtrak has extreme damaging effects as it benefits from plentiful endowment devised for making it more treacherous while grabbing information from the hijacked PC, making sure it remains on the said machine.

To perform the fraudulent operation, cyber-criminals act remotely via entering the bank A/C login details directly on the compromised PC.

Jackson states that Vawtrak is delivered through the Cutwail network of bots chiefly utilized for spam distribution.

At present, nothing is known about the size of the botnet as that isn't a simple task.

However, what's certainly known is that whilst the botnet partly worked to lately leverage assaults against targets within China, Japan and some more countries, the key operation has been from Russian crooks who leveraged big sized assaults against United States entities, believes the Director. Securityweek.com published this in news on September 4, 2014.

ยป SPAMfighter News - 9/12/2014

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page