Title: Advance of Bank Trojan
1Advance of Bank Trojan
Nov 2005
2Current threat from Bank Trojans
- Steals online banking information typically
usernames and passwords. - PWSteal.JGinko targets Japanese banks.
(Trojan-Spy.Win32.Banker.vt Kaspersky Lab,
PWS-Jginko McAfee, TSPY_BANCOS.ANM Trend
Micro) - These Trojans work closely and actively with
Internet Explorer.
3Submission increase
- Symantec gets almost 2 million submissions per
year. - The rate of submissions is increasing.
- Are Bank Trojan submissions increasing?
4PWSteal.Bancos submissions
- Why have submissions decreased?
5Bancos submissions vs Total Symantec submissions.
6How samples are collected
- User submissions
- Honey pot
- Web site routine patrol(Adware, Spyware)
- Brightmail
- BBS
7Japanese Banks VS Bank Trojan
- PWSteal.Bancos originally targeted Brazilian
Banks. - Then, support was added for German and English
Banks. - PWSteal.Jginko targets only Japanese Banks.
- PWSteal.Jginko monitors 27 domains.
- PWSteal.Bancos.T monitors 2746 domains.
8PWSteal.Jginko domains
- resonabank.anser.or.jp, btm.co.jp, ebank.co.jp
- japannetbank.co.jp, smbc.co.jp,
yu-cho.japanpost.jp - ufjbank.co.jp, mizuhobank.co.jp
- shinseibank.co.jp, iy-bank.co.jp
- shinkinbanking.com, shinkin-webfb-hokkaido.jp
- shinkin-webfb.jp
- And more, more, more
9Other Bank Trojans also target rural banks
- 82bank.co.jp, akita-bank.co.jp
- all.rokin.or.jp, toyotrustbank.co.jp
- hyakugo.co.jp, chibabank.co.jp
- fukuibank.co.jp, gunmabank.co.jp
- hirogin.co.jp, hokugin.co.jp
- joyobank.co.jp, nishigin.co.jp
- And more, more, more
10Security measures taken by Japanese Banks recently
- Software Keyboard
- Strong password requirements
- Challenge and response with one-time encryption
key - Prevent phishing mail
- Login restricted by IP address
- SSL
11Advantage of Trojan over KeyLogger
- These Trojans are not KeyLogger.Trojans
- Stealth techniques can be used
- Intercepts transaction information
- Silent download
- Silent update
12Bank Trojans are not KeyLogger.Trojan
- Old KeyLoggers log key strokes and send logged
data. - Difficult to know which application the user was
using - Logs user error
(passeoBack SpaceBack Spaceword ) - Difficult to know when the user changes to a
different input field
13Stealth techniques used by Bank Trojans
- Works with Internet Explorer.
- Firewall does not stop HTTP transaction of
Internet Explorer. (BHO, Inject, layered service
provider) - Injects itself into other process
- Rootkit may hide files or protect them from
security application - Hide packet traffic from system to avoid
detection
14Intercept transaction
- These Trojans can hook specific procedure calls
- These Trojans can inject itself into an
application - HTTPS is not secure if the data is intercepted
before and after it is encrypted
15Silent download/ Silent update techniques
- Trojans may close Alerts from Windows Firewall
- Delete Zone.Identifier settings
- Add itself to Authorized Applications list,
bypassing the firewall
16Technique Key Logging
17Technique Key Logging(2)
18Technique Inject
- Taskmanager can enumerate process
- DLLs are never enumerated by taskmanager.
- If IEXPLORE.EXE calls loadlibrary?
- VirtualAllocEx
- WriteProcessMemory
- GetProcAddress
- CreateRemoteThread
19Technique BHO
- A Browser helper object is an additional software
component that is loaded when Internet Explorer
starts. - When a BHO sends a data, It looks like the data
is sent by Internet Explorer. - The BHO cant be seen with Task manager.
20Loading BHO
- How Internet Explorer loads and initializes
helper objects.
21Technique BHO (2)
22Technique Intercept transaction
23Secure Socket Layer is secure?
Secure
Not Secure
Pickup data Encrypt data
24Technique Intercept transaction (2)
25Technique Intercept transaction (3)
26Technique Intercept transaction (4)
27Technique Intercept transaction (5)
- DWebBrowserEvents2, IHTMLDocument2
- Onmouseover
- User push A or A filled to field.
- Onsubmit
28Technique Silent download
29Technique Silent update
30Technique Silent update (2)
- HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Servic
es\SharedAccess\Parameters\FirewallPolicy\Standard
Profile\AuthorizedApplications\List - Value "Enabled"
31Steal password
32Challenge and response
Send user name
Send user name
Answer random Challenge
Answer Challenge
Calculate one-time password by Challenge and
send it
Send one-time password
Accepted
Answer fake error page
Transfer money
33Thank You!
- Hiroshi Shinotsuka
- Hiroshi_Shintosuka_at_symantec.com