A trojan malware campaign is targeting online banking users around the world with the aim of stealing credit card information, finances and other personal details.
Detailed by cybersecurity researchers at Fortinet, the Metamorfo banking trojan has targeted users of over 20 online banks in countries around the world including the US, Canada, Peru, Chile, Spain, Brazil, Ecuador and Mexico.
It marks an escalation in the attacks, which last month appeared to be restricted to compromising banks in Brazil but have now spread to other targets.
Like many other hacking campaigns, Metamorfo begins with phishing emails that in this case claim to contain information about an invoice and invite the user to download a .ZIP file. By downloading and running the file, the victim allows Metamorfo to execute and run on a Windows machine.
After installation – and after checking to ensure it isn't running in a virtual environment or sandbox – the malware runs an Autolt script execution program. This scripting language is designed for automating the Windows graphical user interface and other general scripting – but has been used by malware as a means of bypassing antivirus detection.
Once running on the compromised Windows system, Metamorfo terminates any running browsers and then prevents any new browser windows from using auto-complete and auto-suggest in data entry fields.
This prevents the user from using auto-complete functions to enter usernames, passwords and other information, allowing the malware's keylogger functionality to collect the data the users are thus obliged to retype. It then sends that data back to a command-and-control server run by the attackers.
Metamorfo even includes a function that monitors 32 keywords associated with the targeted banks, likely so that the attackers can be alerted in real time as to when a victim is trying to access online services.
Researchers haven't revealed the keywords or the names of the financial institutions being targeted, as it's likely the Metamorfo campaign is still active.
To help protect against falling victim to attacks using the malware, users should be wary of unexpected emails and attachments, while using an antivirus product can also help detect the malware.
Ensuring that operating systems and software are both patched and up-to-date can also go a long way to stopping malware being successful as many attacks use known vulnerabilities that can be patched against.
MORE ON CYBERCRIME
- This password-stealing malware just got updated with new tactics to help it hide better
- Online phishing sites skyrocket in number during past year CNET
- This easy-to-use information-stealing trojan malware is quickly gaining popularity among cyber criminals
- Trojan malware is back and it's the biggest hacking threat to your business TechRepublic
- Hook, line and sinker: How I fell victim to phishing attacks - again and again