Home > Cyber News > Chthonic – A new version of the Zeus Banking Trojan hits 150 banks in 15 countries
CYBER NEWS

Chthonic – A new version of the Zeus Banking Trojan hits 150 banks in 15 countries

Chthonic_banking_trojanSecurity experts with Kaspersky Lab report that a brand new strain of the infamous ZeuS Trojan is hitting banking systems over the world. The new threat Trojan-Banker.Win32.Chthonic, or just Chthonic, has already affected a hundred and fifty banks and twenty payment systems in fifteen countries. Financial institutions in Spain, Russia, Italy, Japan and the UK seem to be the primary targets of the Chthonic attack.

The Way of Chthonic

The authors of Chthonic have designed it to exploit PC functions along with the keyboard and web camera in order to steal online banking credentials, like passwords. The crooks can also connect to the compromised machine from a remote location and command it complete various transactions.

Chthonic’s weapon of choice – web injectors, which can enable the threat to insert its malicious code and images into the code of the bank’s web page loaded directly from the affected computer. This allows the crooks to get their hands on the victim’s PINs, phone number and one-time passwords, along with any login details (username and password) that the user has entered.

Chthonic’s Distribution and Infection

Experts report that the main infection method used to distribute Trojan-Banker.Win32.Chthonic to the targeted machine is through malicious emails containing exploits. In this case, the email contains an attached document with a .DOC extension, which purpose is to establish a backdoor for malicious code. In the attachment, there is a specially designed RTF document that exploits the CVE-2014-1761 vulnerability in Microsoft Office products.

As the threat is downloaded, malicious code containing an encrypted configuration file is inserted in the msiexec.exe process, which results in numerous malicious modules being installed on the compromised computer.
These modules can perform the following tasks:

  • Collect system information
  • Enable remote access
  • Steal passwords that have been saved
  • Log keystrokes
  • Record sound and video using the microphone and the web camera

Another technique employed by the attackers to deliver Chthonic is by downloading the threat to the victim’s machine via the Andromeda bot (aka Backdoor.Win32.Androm).

Chthonic’s Victims

Experts report that in the case of a Japanese bank that has been hit by Trojan-Banker.Win32.Chthonic, the malware managed to hide the warnings of the bank and inject script that lets the crooks complete a number of transactions through the victim’s account instead.

Another fresh example is a Russian financial institution, whose clients were presented with fake banking pages the moment they were logged on. For this purpose, the Trojan has created an iframe with a phishing copy of the web page having the exact same size as the original window.

Trojan-Banker.Win32.Chthonic is similar to other Trojans in the wild, for example:

  • Chthonic uses the same downloader and encryptor as Andromeda bots
  • Uses a virtual machine that reminds of the one used in KINS malware
  • Has the same encryption technique as Zeus V2 and Zeus AES Trojans

Luckily, a large part of the code fragments employed by Chthonic for web injections cannot be used anymore, because of the fast reaction of the banks. In some cases, they have changed their pages’ structure and in other – the domains, too.

The Senior Malware Analyst at Kaspersky Lab, Yury Namestnikov says that the discovery of Chthonic is a clear sign that the ZeuS Trojan is still evolving. Malware writers are employing the latest techniques, which were helped by the leak of source code of ZeuS. According to the expert, Chthonic is the next level in ZeuS’evolution.

donload_now_250

Spy Hunter FREE scanner will only detect the threat. If you want the threat to be automatically removed, you need to purchase the full version of the anti-malware tool. Find Out More About SpyHunter Anti-Malware Tool

Berta Bilbao

Berta is a dedicated malware researcher, dreaming for a more secure cyber space. Her fascination with IT security began a few years ago when a malware locked her out of her own computer.

More Posts

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree