We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

New bank Trojan employs fresh tricks to steal account data

'OddJob' still being fully fleshed out, says Trusteer

Cybercriminals in Eastern Europe have begun using a dangerous new malware program to steal from online bank accounts.

The Trojan program, dubbed 'OddJob', appears to be a work in progress, but is already different from many malware in at least two respects, according to Amit Klein, chief technology officer at security firm Trusteer, which discovered it.

Unlike other conventional hacking tools, OddJob does not require fraudsters to log into a user's online bank account to steal from it. Instead, the malware is designed to hijack a user's online banking session in real-time by stealing session ID tokens.

These are tokens issued by a bank to identify a user's online bank session. By stealing the tokens and embedding them into their own browsers, fraudsters can impersonate a legitimate user and access accounts while the user is is still active online. The access allows fraudsters to then conduct whatever banking operations the account holder can perform.

"The malware essentially allows the fraudster to share the session with the victim so that any activity the victim can see, the fraudster can see as well," Klein said.

The approach is different than typical man-in-the browser attacks where attackers use Trojans to steal login credentials that are then used to break into online accounts.

The second interesting feature in OddJob is its ability to keep an online banking session open and live even after users think they have logged out of their account. This allows criminals to extract money and continue other fraudulent activity even after the user thinks the session has ended.

"The fraudster has a keen interest in the session not being terminated. So in order to avoid that, the malware has the ability to detect logout attempts and to discard them," he said. The users will likely not notice the failed logout, or will assume the bank server is sluggish and shut their browser down without realising that their sessions are still active.

Trusteer first came across OddJob last year during a fraud investigation for a bank. The company has been unable to openly talk about it until now because of investigations by law enforcement agencies, Klein said.

OddJob presently is programmed to steal session ID tokens from customers of dozens of specific banks in the US, Poland and Denmark. When customers log into their accounts using Microsoft's Internet Explorer or Mozilla's Firefox, OddJob grabs their session ID token and sends it in real-time to the Command-and-Control server where the session can be hijacked.

According to Trusteer, an analysis of OddJob's configuration data shows that it can be programmed to execute other actions on targeted website besides stealing session information. The code can grab full pages of data, terminate connections and inject malicious code into sites.

Unlike most banking Trojans , when OddJob gets downloaded on a user's system its configuration code is not saved to disk. Instead, a fresh copy of the configuration data is grabbed from the Command-and-Control server each time a fresh browser session is opened.

OddJob will likely feature more sophisticated functions in future, Klein said. "We believe it is a work in progress. We are seeing functions being added on a weekly basis."

See also: Zeus Trojan intercepting bank text messages


IDG UK Sites

Best January sales 2015 UK tech deals LIVE: Best New Year bargains and savings on phones, tablets,...

IDG UK Sites

Chromebooks: ready for the prime time (but not for everybody)

IDG UK Sites

2015 visual trends: 20 leading designers & artists reveal what should be inspiring us in 2015

IDG UK Sites

Mac tips tricks & hacks: 10 things you didn't know your Mac could do