A banking spyware known as Telax 4.7 has been targeting mainly users speaking Portuguese, ESG malware researchers report. Users should beware of fake email messages that may claim their PayPal account has been compromised. It is highly advisable in case you have any suspicion that you may have the banking oriented malware to use immediately a safe PC to reset your credentials and change as much financial information you can. Also, it is advisable to clean the affected computer with an advanced anti-malware tool that will eradicate it in full, instructions for which are mentioned after this article.
|Name||Telax 4.7 Banking Trojan|
|Type||Banking Malware(Trojan Horse)|
|Short Description||The trojan uses a Trojan.Downloader to initially infect the victim PC after which is being downloaded and executed to most likely steal financial data.|
|Symptoms||Primary symptoms may be disabled anvitirus as well as firewall. In some cases the user may also witness his screen glitching or refreshing while the trojan may be taking screenshots. Initial detection that may fool the user he has removed the threat is also possible.|
|Distribution Method||Via bit(.)ly redirect links advertised in spam messages over social media and email.|
|Detection Tool||Download Malware Removal Tool, to See If Your System Has Been Affected by Telax 4.7 Banking Trojan|
|User Experience||Join our forum to discuss about Telax 4.7 Banking Trojan.|
Telax Banking Trojan – How Is It Spread
The Trojan itself is spread primarily via emails that may be either spoof or pure spam. The tricksters operating the malicious threat have been reported to develop “soc eng” (Social Engineering) pitches and strategies promising rewards or other compensations in return for visiting a web link attached to the email. Reports indicate the Trojan may promise free licenses for paid software as well as other trials and rewards.
A malicious campaign spreading Telax has been detected in Brazil where more than 100 000 users have been affected. Read more about it:
Telax Banking Trojan – How Does It Work
First, the banking trojan uses a URL shortening service (bit(.)ly) to shorten its web links and, more importantly, mask the original domain name, making it difficult to track down. Once clicked on the link, it has been reported that users may experience redirects to a malicious script that is hosted on the Google`s cloud service. Note that this is particularly dangerous because users are more likely to trust something that has the google domain and click on it. What it is reported to be is a downloader for the malicious payload of the Trojan.
Once it has been visited, by a user it may begin a countdown to inject yet another redirect, however, this time with a delay. It has been reported that the malicious application of the Trojan may be spotted in either one of these two file extensions:
To further make itself, even more, trustworthy, the Trojan may carry a name that is the same as a legitimate, respectable and safe app. The web links to this trojan are mostly being sent out to users who are active on the social media (Facebook, Twitter, etc.).
What is more, users who would like to have a free license of a product, should not trust spam messages with bit(.)ly shortened web links in them, because they may be tricked to open the trojan`s executable.
Once activated, the Trojan.Downloader downloaded from the Google Cloud may establish an active HTTP session and download the exe of Telax banking malware itself and most likely several other tools such as cryptors to keep it concealed by anti-spyware software.
Researchers claim that the Telax Trojan threat is the perfect example of a sophisticated intrusion that may also have encrypted data transfer with its C&C(Command and Control) server or servers. Furthermore, it may have the ability to support 32 as well as 64-bit systems. Furthermore, Telax has tools to hack past more sophisticated authentication.
What is more, this trojan is packed with a malicious code which is injected into the legit vbe.exe process that is running actively on the affected system. Further more the Trojan may have the ability to install rootkit components. But that is not all – it also has a legitimate SQL based DLL “in store” that contains a 64-bit copy of itself. As soon as this rootkit component is installed, Telax may report to the control server that the infiltration of the system has been conducted successfully also including extensive information about the computer, more particularly information that may assist the hacker to conceal the Trojan for as long as possible.
The abilities of this Trojan may be many. From transferring information live about what the user inputs when using online banking to taking screenshots of the PC on demand.
Cyber-criminals have become increasingly smarter, using Trojan.Downloader type of malware that may also collect information and disable PC security before an actual infection takes place. They have also improved their online social engineering skills, using reputable websites such as PayPal, eBay or others as a from to their spam mails. Users should be educated always to double check a web link on a computer where they store their important data or to only use such a computer for online banking and nothing else. Also, it is important to bear in mind that the home network of the user has to be more secure in order to prevent such intrusions in the first place. For that is required to have an advanced anti-malware software that will secure each machine and stop a threat from intruding, not to mention spreading over the network. The usage of email clients that contain spam blocking tools is also advisable.
Removing Telax Banking Trojan Completely
To be rid of this trojan, it is highly recommended to guide yourself by the step-by-step removal manual outlined after this article. It is also important to have an anti-malware scanner that should be regularly updated with definitions against the Telax Banking Trojan.