Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Banker Trojan having Authentic Digital Certificate Identified

According to MalwareBytes, one new bank-information stealing Trojan known as Spyware.Banker.FakeSig is prowling while arriving with a digital certificate that's integrated into it. The involved assaults begin by serving one Portable Document File (PDF) that masquerades as a transaction bill.

The security company states that the password-stealing banker Trojan, originating from Brazil, has the signature of one authentic digital certificate that DigiCert apparently issued.

Further, according to it, the cyber-criminals delivering Spyware.Banker.FakeSig employed a certificate, which was meant for 'Buster Paper Comercial Ltda,' one genuine organization developing software. As per DigiCert, Buster Paper had been appropriately registered so in keeping with adopting the standard industry procedures, it supplied the digital certificate, elaborates MalwareBytes.

Officially, DigiCert stated that the agency after examining the matter thoroughly substantiated that Buster Paper-issued certificate had been authorized as also it supplied the same according to industry rules. Besides, based on a confirmation by the 'Brazilian Ministerio da Fazenda: Cadastro Sincronizado Nacional,' it's perceived that during issuing of the software module endorsing certificate, Buster Paper Comercial Ltda acquired legitimate registration for its business. And, the terms-and-conditions of DigiCert's product utilization unambiguously say that its certificate isn't just meant for malware activity.

CEO Jeff Hudson of Venafi an EKCM (Enterprise Key and Certificate Management) solutions developer, yet again elaborates how vital it's to accurately handle digital certificates.

Hudson argues that despite organizations implementing defense systems over multiple stages for safeguarding against malware targeting computer-networks while confidential data getting captured thereof, security-hacks occur. Therefore, one should now question whether the dilemma relates to technology type alternatively mismanagement of the same, he articulates. Softpedia.com published this dated February 6, 2013.

Hudson also says that trust can dwell solely via the knowledge of places of weaknesses as also via appropriately solving them. The weaknesses may include incorrect revelation of the place of encryption keys and certificates existence on cloud deployment or the network.

The CEO adds, it's vital to be prepared towards addressing such assaults, while within the present incident, the CA, without delay, invalidated the certificate. Every company should follow best practices so any assault maybe rectified fast and destruction from it mitigated, he concludes.

Related article: Banker Trojans Spread Deeper and Wider

» SPAMfighter News - 2/12/2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next