Keylogging Trojan uses unique attack

Deutsche Bank trials show effectiveness of unhelpful browser helper object at stealing data

An alert has been issued for a new Trojan that uses a unique method of sneaking past network administrators and corporate firewalls.

The Trojan arrives as an attachment and pretends to be an Internet Explorer Browser Helper Object (BHO). It includes keylogging software that is activated when the user visits certain web sites, typically banking and login in screens.

What makes this Trojan unique is the method it uses to send this information back. Traditionally keyloggers send back recorded information as email or HTTP POST but increasingly these types of transmissions are being watched for by security software.

Instead the Trojan encrypts its data using a XOR algorithm and then builds an Internet Control Message Protocol (ICMP) ping packet, which looks like legitimate network traffic. Internet Control Message Protocol (ICMP) ping packets are typically used to check connection speeds and deliver error messages.

"The method of network transport used by the attacker makes this Trojan unique," said internet monitoring company Websense in its alert.

"To network administrators and egress filters, this ICMP packet looks like legitimate traffic leaving the network. The attackers presumably capture this packet at their remote server, where the packet is easily decoded to reveal the information entered by the user."

Deutsche Bank

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

Data breach exposes widespread fake reviews on Amazon
data breaches

Data breach exposes widespread fake reviews on Amazon

7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
What are SSH keys?
cyber security

What are SSH keys?

7 May 2021
Google’s about to push everyone into two-factor authentication
Security

Google’s about to push everyone into two-factor authentication

6 May 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021
Qualcomm modem flaw puts millions of Android users at risk
Google Android

Qualcomm modem flaw puts millions of Android users at risk

6 May 2021