Online banking data stealing virus on the prowl in cyberspace
Cyber security sleuths have alerted online banking customers in the country against the malicious activity of a deadly 'Trojan' virus which steals classified data and passwords of a vulnerable user.
"It has been reported that variants of a new banking Trojan dubbed as 'Dyreza' are spreading. The malware mainly targets the customers of well-known financial institutions running Microsoft Windows operating system."
"It propagates by using social engineering techniques or by means of spam messages pretending to be genuine mail received from financial institution containing either a Zip or PDF as an email attachment exploiting the vulnerability in unpatched versions of Adobe Reader to download the malware.
"The ZIP contains a self executing malware which installs itself on the target system on being extracted," the Computer Emergency Response Team of India (CERT-In) said in its latest advisory to users of online banking system.
The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet domain.
The agency said the malware is capable to wreak havoc into a secure system in a number of ways.
The 'Trojan' virus, an unauthorised programme which passively gains control over another system by representing itself as an authorised programme, steals infected bank customers' online banking credentials, can bypass secure protection settings using browser hijacking, can capture keystrokes, perform man-in-the-middle attack to intercept network traffic and communicate with command and control server, the agency said.
Once the spam mail is received by a bank customer, the agency said, it "entices" the user to download and extract the Zip file which then begins its destructive and stealing action.
The virus is categorised as "deadly" as it can acquire as many as ten aliases to evade anti-virus updates.
The said malware performs by injecting malicious code in the web browsers including Chrome, Firefox, Internet Explorer, so that when infected user visits any of the banking sites their credentials are stolen.
The command traffic, after the virus is activated in the user network, is first re-directed to the malicious server and then to the legitimate banking site thereby copying and stealing proprietary data, the advisory said.
The CERT-In has suggested some counter-measures to safeguard against this virus.
"Configure your email server to block or remove email that contains file attachments that are commonly used to spread threats such as .vbs, .bat, .exe, .pif and .scr files, set Internet and local intranet security zone settings to high, lock out accounts after number of incorrect login attempts.
"Also, limit or eliminate the use of shared or group accounts, do not visit untrusted websites, enable firewall at gateway or desktop level, do not download or open attachment in emails received from untrusted sources or unexpectedly received from trusted users and install and scan anti-malware engines and keep them up-to-date," it said. (PTI - Economic Times)
Category : Banking | Comments : 0 | Hits : 735
Get Free Daily Updates Via e-Mail on Income Tax, Service tax, Excise and Corporate law
- Income Tax Dept serves notices to salaried individuals for documentary proof to claim exemptions
- Bank Branch Audit 2021 - Update on allotment of Branches
- Bank Branch Audit 2020 Updates
- Bank Branch Audit 2021 Updates
- Bank Branch Audit 2020 - Update on Allotment of Branches
- Police Atrocities towards CA in Faridabad - Its Time to be Unite
- Bank Branch Statutory Audit Updates 2019
- Bank Branch Statutory Audit Updates
- Bank Branch Audit 2022 Updates
- Bank Branch Statutory Audit Updates
- NFRA Imposes Monetary penalty of Rs 1 Crore on M/s Dhiraj & Dheeraj
- ICAI notifies earlier announced CA exam dates despite pending legal challenge before SC
- NFRA debars Auditors, imposes Rs 50 lakh penalties for lapses in Brightcom, CMIL cases
- GST Important Update - Enhancement in the GST Portal
- NFRA Slaps Rs 5 lakh Penalty on Audit Firm for lapses in Vikas WSP Audit Case
- CBDT extends due date for filing Form 10A/10AB upto 30th June, 2024
- RBI comes out with FEMA regulations for direct listing on international exchange
- RBI directs payment firms to track high-value, fishy transactions during elections
- NCLT orders insolvency proceedings against Subhash Chandra
- Income Tax dept starts drive to dispose of appeals, 0.54 million at last count
- Payment of MCA fees –electronic mode-regarding
- Budget '11-12' Parliament Completes Approval Exercise
- Satyam restrained from operating its accounts
- ICICI a foreign firm, subject to FDI norms: Govt
- Maha expects Rs 15 crore entertainment tax revenue from IPL
- CAG blames PMO for not acting against Kalmadi
- No service tax on visa facilitators: CBEC
- Provision of 15-minutes reading and planning time allowance to the candidates of Chartered Accountants Examinations
- Companies Bill to be taken up in Monsoon Session
- File Service Tax Return in time as Maximum Penalty increased 10 times to Rs. 20000

Comments