2、研究人员剖析金融类恶意代码隐蔽VNC通讯模块
标题:Anatomy of an hVNC Attack
作者信息:January 25, 2017 By Lior Keshet 、Limor Kessem
//BEGIN
Top-tier financial malware like Dridex, Neverquest and Gozi offer a wide range of malicious capabilities, such as form-grabbing, screen capture, webinjections and more. One notable capability is the hidden virtual network computing (hVNC) module, which allows attackers to gain user-grade access to an infected PC. It’s no secret that banking Trojans contain remote control capabilities, but how exactly they operate them is not well-known.
Hidden virtual network computing is a tactical means for malware to control a machine without the victim’s knowledge. To illustrate, we will use our detailed technical analysis of the Gozi Trojan’s hVNC module.
IBM的X-Force研究小组最近发现了一种隐秘的VNC通讯模块被用于各种高级金融类恶意代码,比如Dridex,Neverquest以及Gozi等,进而能获取用户的屏幕截图、网站Web注入以及更多。
本来这个VNC-Virtual Network Computing是个正常的功能,但是加上了前缀hidden就变成了hVNC就容易被恶意利用了:它能在用户毫不知情的情况下,偷偷监控用户的一切行为。
//END
Conclusion
Hidden VNC is one of many hallmarks of financial malware. Although not new, it is still popular and common in online banking fraud today. Cybercriminals use remote control in a variety of fraud scenarios, with and without actual malware on the victim’s endpoint. We plan to explain more about this hVNC capability and show a demo of it in upcoming security conferences.
In the meantime, banks and financial organizations can protect customers from remote control-enabled fraud with tools such as IBM Security Trusteer Rapport and about IBM Security Trusteer Pinpoint Detect.
Relevant IOCs
MD5 of the VNC module we analyzed: c24800a5d619b555f93e42845417a5e5
Relevant Gozi Trojan MD5: 3CDA89FB87EC5CC6DFE7099A71612B8F
金融类恶意代码有很多特性,hVNC是其中之一。虽然这并不是什么革命性的技术,但是到目前为止还非常流行以及普遍,它们常常被用在在线网银欺诈中,有了它的支持,黑客们甚至都不用在受害者的机器上安装任何恶意代码就可以实现自己的欺诈、盗取钱财的目的。针对该技术的研究还在继续。
点评:该模块技术一旦被恶意作者掌握,将是灾难性的。
|