Cybercrime moves to the cloud
Researchers say criminals are moving their malware heavy lifting from end user PCs to servers in the cloud.
The
same flexibility and freedom companies get from having their software
and services hosted in the cloud is enabling cybercriminals to conduct
highly automated online banking theft -- without doing much of the
necessary information processing on their victims' own computers.
Security
and privacy experts have long worried that criminals would launch
attacks on the servers storing the data in cloud environments. But, a
report released this week from McAfee and Guardian Analytics shows that
criminals are now using the cloud infrastructure itself to get more
capability out of their campaigns.
"They are leveraging
the cloud," Brian Contos, senior director of emerging markets at
McAfee, said in an interview. "This is the first time we've ever seen
this."
Basically, what researchers uncovered was a
series of highly sophisticated campaigns designed to siphon money out of
high balance bank accounts in Europe, the U.S. and South America
through automated transfers. Like most online consumer bank fraud, the
attacks started off with a phishing e-mail, typically pretending to be
from a victim's bank and urging the recipient to click a link to change
the account password. Once the link is clicked, a Trojan -- in this case
Zeus or SpyEye -- was downloaded onto the victim's computer, in early
versions of the attacks. In later versions the malware is operating from
a server.
When the victim goes to log into the bank
site, the malware would use a so-called Web inject technique to overlay
what looks like the bank Web page in the victim's browser. However,
behind the scenes and totally transparent to the victim, something
entirely different is happening. While the victim thinks he or she is
transferring money from a savings account into a checking account, for
instance, the malware is actually transferring any amount of money the
criminals specify into their own account.
Traditionally,
banking malware like this will handle the processing from the victim's
PC. But in this case, the heavy lifting of the malware is being done on
the server in the cloud, according to Contos. In the operations McAfee
and Guardian Analytics uncovered the servers were located in eastern
European countries, he said. The servers are located mostly at "bullet
proof" ISP that have lax policies and are re-located frequently to avoid
discovery.
"The servers are sitting within ISPs that
are designed specifically to take part in fraud," he said, adding that
the criminals in these campaigns even managed to bypass two-factor
authentication systems commonly used in European consumer online
banking. For instance, not only does a consumer type in a username and
password to a site, but also swipes a card into a special card reader
attached to the PC that provides additional data proof that the
legitimate user is accessing the account.
The log-in or
authentication "information is taken from the malware (on the PC) and
redirected to the server in real time, Contos said. "That server takes
that data and authenticates against the victim's bank account, all
within seconds."
The servers -- at least 60 were used
in these operations -- provided the criminals with the ability to fully
automate the attacks, so less manual intervention is needed on the part
of the attacker to do things like adjust the amount to steal that will
be below fraud detection levels.
"The server is the
brains that does all the transactions in the bank account," he said.
Rather than having the malware residing on the victim's computer take
charge of the attack functions, like stealing the data and sending it
off somewhere, the attack itself is performed by the server.
"All
the intelligence is sitting on the server side that they are putting in
the cloud," he said. "The criminals don't have to change anything on
the end user side. They can make modifications on the server side. They
still have malware on the user's machine, but it can be smaller and much
less intelligent than in the past."
The malware on the
victim's computer can stay simple and doesn't need to be updated to
change the functionality of the attack; that can be done on the server
side."It's all designed to make (the attack) scalable and agile," Contos
said. "This also allows criminals to keep attacks alive as long as
possible" because there is less activity on the end user's computer that
can be detected.
Contos predicts this is the future of
malware operations, much like many online business operations have
moved to the cloud to save time and resources for companies. Once the
malware is on an end user's computer, criminals can use those computers
for a multitude of operations and attacks.
"We will see
people repurposing malware for this purpose," he said. "They will use
the install base (of an existing botnet, for example) and ride that wave
and set up their own servers" to use the victim computers for theft.
more @ http://news.cnet.com/8301-1009_3-57464177-83/cybercrime-moves-to-the-cloud/?tag=mncol;topStories
Thursday, November 22, 2012
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment