» 뉴스 » Casbaneiro 뱅킹 트로이 목마는 암호 화폐를 훔치기 위해 유튜브를 사용

Casbaneiro 뱅킹 트로이 목마는 암호 화폐를 훔치기 위해 유튜브를 사용

ESET는 은행 트로이 목마의 새로운 Casbaneiro 제품군을 공부. 악성 프로그램은 브라질과 멕시코 사용자의 암호 화폐 사냥 및 비디오 설명에서 흔적을 숨기기 위해 유튜브를 사용.

uring the study, ESET 전문가들은 Casbaneiro 뱅킹 트로이 목마의 또 다른 가족과 유사한 기능을 가진 발견 – mavaldo. Malicious programs use the same cryptographic algorithm and distribute a similar malicious email utility.

Like Amavaldo, the Casbaneiro Trojan uses pop-ups and forms to trick victims. Such methods of social engineering are aimed at primary emotionsa person is urgently, without hesitation forced to make a decision. The reason may be a software update, credit card verification, or a request from a bank.

“One method observed is having the C2 address embedded in an online document (Google Docs). The file is filled with useless text but also contains the name of the domain in encrypted form. The start and the end of the string are marked by an exclamation point and it is encoded in hexadecimal”, - 보고서 ESET researchers.

감염 후, Casbaneiro restricts access to various banking sites, as well as monitors keystrokes and takes screenshots. 게다가, the Trojan monitors the clipboardif the malware sees the personal data of a cryptocurrency wallet, it replaces the recipient’s address with the scammer’s wallet.

The Casbaneiro family uses many sophisticated algorithms to mask code, decrypt downloaded components, and configuration data. The main way Casbaniero is distributed is through malicious phishing emails, like Amavaldo.

또한 읽기: 포르노 사이트 사용자에 트로이 목마 바레 니키 스파이

A feature of the Trojan was that Casbaneiro operators carefully tried to hide the domain and port of the C&C 서버. He was hidden in a variety of placesin fake DNS records, 에서 Google Docs online documents, and even on fake websites of various institutions. It is interesting that sometimes attackers managed to hide the traces of the managing server on official sites, as well as in video descriptions on 유튜브.

독서  완전히 Issch.exe 광부의 바이러스를 제거

Connecting to YouTube is no cause for concern because it is normal traffic. Even taking a look at the video gives no clue and the link at the end of the description is easily missed, the researchers say.

Although the malware is not sophiticated, its capabilities are extensive enough to generate multiple revenue streams for its operators or to enable them to switch to different money-driven attacks.

[합계: 0    평균: 0/5]

트로이 킬러 소개

메모리 스틱에 트로이 킬러 휴대용 운반. 당신은 당신이 어디를 가든 당신의 PC가 어떤 사이버 위협에 저항 도울 수 있는지 확인하십시오.

또한 확인

Audioddx.exe CPU 광부 트로이 목마를 제거하는 방법

새로운, very dangerous cryptocurrency miner virus has actually been spotted by safety and security

제거 Vmicsvc.exe CPU 윈도우에서 광부 트로이 목마 10

브랜드 새로운, 정말 안전하지 않은 암호 화폐 광부 감염은 보안 연구자들에 의해 발견되었다. 악성 코드, …

회신을 남겨주