Skip to content
Insecure Lab

Insecure Lab

Hacker News

  • Insecure Lab
  • Contact Us

SpyEye Banking Trojan – Now with SMS Hijacking Capability

Hacking Tips Tricks News / Stories Social Engineering Attacks
6-October-20119-October-2011Prasanna Sherekar

SpyEye TrojanThe Trusteer research team recently uncovered a stealth new attack carried out by the SpyEye Trojan that circumvents mobile SMS (short message service) security measures implemented by many banks. Using code captured while protecting a Rapport user, researchers discovered a two-step web-based attack that allows fraudsters to change the mobile phone number in a victim’s online banking account and reroute SMS confirmation codes used to verify online transactions. This attack, when successful, enables the thieves to make transactions on the user’s account and confirm the transactions without the user’s knowledge.

Step 1:
In the first step of the attack, SpyEye steals the victim’s online banking login details. This is standard operating procedure for financial malware like SpyEye, Zeus, and others. The fraudsters can now access the victim’s account without raising any red flags that would be picked up by fraud detection systems.

Step 2:
In Step 2, SpyEye changes the victim’s phone number of record in the online banking application to one of several random attacker controlled numbers. In order to complete this operation the attacker needs the confirmation code which is sent by the bank to the customer’s original phone number. To steal this confirmation code the attacker uses the following social engineering scheme.

First, SpyEye injects a fraudulent page in the customer’s browser that appears to be from the online banking application. The fake page purports to introduce a new security system that is now “required” by the bank and for which customers must register. The page explains that under this new security process the customer will be assigned a unique telephone number and that they will receive a special SIM card via mail. Next, the user is instructed to enter the personal confirmation number they receive on their mobile telephone into the fake web page in order to complete the registration process for the new security system. This allows the criminals to steal the confirmation code they need to authorize changing the customer’s mobile number.

Now the fraudsters can receive all future SMS transaction verification codes for the hijacked account via their own telephone network. This allows them to use the SMS confirmation system to divert funds from the customer’s account without their knowledge, while not triggering any fraud detection alarms.

Tagged Bank Account HackBanking TrojanHacking Bank AccountHacking ToolHacking ToolsHacktoolsNewsSMS HijackingSpy EyeSpy Eye TrojanSpyEyeSpyEye Banking TrojanSpyEye TrojanStoriesTrojan

Post navigation

EPPB – BlackBerry, iPhone Password Recovery Tool
THC SSL DOS Tool Released

Related Posts

Caching bugs exposed in second biggest DNS server

2-March-2009Prasanna Sherekar

How the PlayStation Network was Hacked ?

27-April-201128-April-2011Prasanna Sherekar

Backdoor in Android for No-Permissions Reverse Shell

22-December-20115-January-2012Prasanna Sherekar

Categories

  • Android Hacking
  • Antivirus / Firewall
  • Application Security
  • Bug
  • Conference
  • Contest
  • Cryptography
  • Database Hacking
  • DoS Attacks
  • EMail Hacking
  • Exploits
  • Facebook Hacking
  • Google Hacking
  • Hackers
  • Hacking Tips Tricks
  • Hacking Tools
  • Information Gathering
  • Input Validation Attacks
  • Intrusion Detection
  • IOS Hacking
  • Malware / Rootkit
  • Mobile Hacking
  • Network Forensics
  • Network Hacking
  • News / Stories
  • Password Hacking
  • Penetration Testing
  • Privacy Attacks
  • Security Tools
  • Social Engineering Attacks
  • Twitter Hacking
  • Uncategorized
  • Videos
  • Viruses
  • Vulnerabilities
  • Website Hacking
  • WhatsApp Hacking
  • White Papers
  • Windows Hacking
  • Windows Tweaks
  • Wireless Hacking
www.insecure.in | © 2023  Insecure Lab, India.