{"id":1583,"date":"2015-09-05T04:27:57","date_gmt":"2015-09-04T20:27:57","guid":{"rendered":"http:\/\/staging.bankvaultonline.com\/?p=1583"},"modified":"2015-09-05T04:27:57","modified_gmt":"2015-09-04T20:27:57","slug":"alert-new-version-of-carbanak-banking-malware-striking-us-and-eu-banks","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/alert-new-version-of-carbanak-banking-malware-striking-us-and-eu-banks\/","title":{"rendered":"Alert: New Version of Carbanak Banking Malware Striking US and EU Banks"},"content":{"rendered":"
From Threatpost: <\/strong><\/p>\n New variants of the notorious Carbanak Trojan have surfaced in Europe and the United States, and researchers say that the malware now has its own proprietary communications protocol and the samples seen so far have been digitally signed.<\/p>\n Carbanak has been in use for several years, and researchers at Kaspersky Lab earlier this year revealed the details of a major Carbanak campaign that took banks for about $1 billion. That campaign targeted banks directly, rather than going after end users. The attacks begin with spearphishing emails that have rigged attachments containing the Carbanak backdoor. Once on a compromised machine, Carbanak gives attackers remote control of the machine and the criminals used that as a foothold on the bank\u2019s network and then stole money in several different ways.<\/p>\n \u201cThese bank heists were surprising because it made no difference to the criminals what software the banks were using. So, even if its software is unique, a bank cannot get complacent. The attackers didn\u2019t even need to hack into the banks\u2019 services: once they got into the network, they learned how to hide their malicious plot behind legitimate actions. It was a very slick and professional cyber-robbery,\u201d Sergey Golovanov, Principal Security Researcher at Kaspersky Lab\u2019s Global Research and Analysis Team, said when the Carbanak report was released earlier this year.<\/p>\n