IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Keylogging Trojan uses unique attack

Deutsche Bank trials show effectiveness of unhelpful browser helper object at stealing data

An alert has been issued for a new Trojan that uses a unique method of sneaking past network administrators and corporate firewalls.

The Trojan arrives as an attachment and pretends to be an Internet Explorer Browser Helper Object (BHO). It includes keylogging software that is activated when the user visits certain web sites, typically banking and login in screens.

What makes this Trojan unique is the method it uses to send this information back. Traditionally keyloggers send back recorded information as email or HTTP POST but increasingly these types of transmissions are being watched for by security software.

Instead the Trojan encrypts its data using a XOR algorithm and then builds an Internet Control Message Protocol (ICMP) ping packet, which looks like legitimate network traffic. Internet Control Message Protocol (ICMP) ping packets are typically used to check connection speeds and deliver error messages.

"The method of network transport used by the attacker makes this Trojan unique," said internet monitoring company Websense in its alert.

"To network administrators and egress filters, this ICMP packet looks like legitimate traffic leaving the network. The attackers presumably capture this packet at their remote server, where the packet is easily decoded to reveal the information entered by the user."

Deutsche Bank

Featured Resources

The Total Economic Impact™ Of Turbonomic Application Resource Management for IBM Cloud® Paks

Business benefits and cost savings enabled by IBM Turbonomic Application Resource Management

Free Download

The Total Economic Impact™ of IBM Watson Assistant

Cost savings and business benefits enabled by Watson Assistant

Free Download

The field guide to application modernisation

Moving forward with your enterprise application portfolio

Free Download

AI for customer service

Discover the industry-leading AI platform that customers and employees want to use

Free Download

Most Popular

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs
zero-day exploit

Apple patches 'superpower' zero-days affecting iPhones, iPads, and Macs

18 Aug 2022
Why convenience is the biggest threat to your security
Sponsored

Why convenience is the biggest threat to your security

8 Aug 2022
Google is now spending a staggering amount on blockchain
Business strategy

Google is now spending a staggering amount on blockchain

17 Aug 2022