Online fraudsters that aren’t highly skilled in the arts of cyber crime can now rent a service that offers an all-in-one hosting server with a built-in Zeus trojan administration panel and infecting tools, allowing them to create their own botnet.
EMC’s security division, the RSA Anti-Fraud Command Centre (AFCC), cited an increase in the use of the Zeus trojan in attacks against financial institutions in its April online fraud report, claiming the trojan is “extremely user friendly and easy to operate”.
“Fraudsters who execute Zeus attacks simply need to take control of a compromised server or have their own back-end servers; once they have a server in place, they merely need to install the Zeus administration panel, create a user name and password, and start launching their attacks,” the report stated.
But the AFCC recently traced a new service that does all of the above for would be botnet barons. The service offers access to a “bullet-proof hosting server with a built-in Zeus trojan administration panel and infection tools…the service includes all of the required stages in a single package, meaning that all the fraudster now has to do is pay for the service, access the newly-hired Zeus trojan server, create infection points and start collecting data”.
RSA’s banking and finance specialist, Geoff Noble, said that those offering the Zeus package are mirroring what legitimate security vendors are offering — security-as-a-service — but in their case they are slinging malware-as-a-service.
“Phase one of online threats was stealing credit card numbers, buying stuff on the internet and selling it somewhere else to make a profit. Phase two is this grabbing of user names and passwords online, phase two ‘b’ is productizing that solution, and phase 2 ‘c’ is offering that solution as a service,” Noble said.
“What Zeus means is that you are buying a service with traditional software support and maintenance, so you can go about your business without updating and patching.”
RSA said that the exploit package allows fraudsters to easily infect users and grow a botnet of compromised machines, and boasts an easy to use Web hosting control panel that can be used by virtually anyone.
“The bottom line is that with such services, creating the infrastructure for Zeus attacks and actually implementing these attacks is now easier than ever before”, the report said.
“It makes it markedly easier because you don’t need to bring together the three components. The challenge still remains — how to get the cash out — and that will likely be the constriction point getting in the [fraudsters] way; it will be a lot easier to do on the attack front but the cash still needs to come out of the channel,” Noble said.
Victims receiving e-mails at home or work offering amazing deals to become the local financial outpost for a multinational company is just one of the ways the fraudsters are getting the cash out.
“People still get sucked into that, and that’s one of the variants of getting the cash out. The fact that it’s too good to be true doesn’t always sink into everyone and people still become mules. And we’re seeing a lot more specific approaches to people to become mules in tandem with the ease of use for non-tech spooks and fraudsters,” he said.
The Zeus trojan is designed to perform advanced key logging when infected users access specific Web pages. The information it collects is encrypted when it is sent to the collection point, and can be communicated over SSL encryption.
The monthly AFCC report found that US banks continued to be the dominant target of cyber criminals with 62 percent of attacks, followed by the UK with 11 percent. Australia and New Zealand made it into the list for the second month running as phishing in the Asia-Pacific region continues to grow.
The US also topped AFCC’s April list of top hosting countries, with 51 percent of phishing attacks originating from there — a 12 percent decrease from the previous month. China came in second position with 19 percent of attacks, while Australia was responsible for 2 percent of threats.
Comment: [email protected]