New malware program hooks into networking APIs to steal banking data

The Emotet malware can sniff information even from HTTPS conenctions, researchers from Trend Micro said

There is yet another reason to be wary of spam email about bank transfers or invoices -- it could be carrying a new, cleverly designed malware program that steals financial information.

Most Trojan programs steal financial information from users by injecting rogue forms into Web browsing sessions, but a newly discovered malware program takes a different approach and leverages browser network APIs to sniff outgoing traffic.

The new threat has been named Emotet by security researchers from antivirus vendor Trend Micro, who recently analyzed variants targeting the customers of several German banks. The malware is distributed via malicious links in spam email messages that masquerade as bank transfer notifications or invoices.

When it first runs on the system, Emotet downloads some additional components and a configuration file that contains the URLs and other strings it will search for inside network traffic.

The configuration files analyzed so far appeared to primarily target German bank websites, but there might be variants targeting banks from other countries, the Trend Micro researchers said in a blog post Friday.

The main Emotet component downloads a DLL file and injects it into all processes running on the system, including Web browsers. The file has the capability to monitor outgoing network traffic from those processes and look for strings specified in the configuration file.

"If strings match, the malware assembles the information by getting the URL accessed and the data sent," the Trend Micro researchers said. "The malware saves the whole content of the website, meaning that any data can be stolen and saved."

The DLL component can also sniff data from encrypted browsing sessions because it hooks directly into the network APIs (application programming interfaces) used by browsers.

This method of stealing information is much harder to detect by users than those involving phishing or rogue form fields injected into pages, the Trend Micro researchers said. "Users can go about with their online banking without ever realizing that information is being stolen."

Another interesting aspect of Emotet is that it encrypts the stolen data and stores it in the system's registry. This is likely another attempt to avoid detection by not creating files on the system.

According to Trend Micro's data, the largest number of Emotet infections were detected in Europe, especially in Germany.

However, Emotet infections have also been detected in other regions, like Asia-Pacific and North America, suggesting that the threat is not exclusive to a specific region or country, the Trend Micro researchers said.

Read more: World Cup connectivity was not without its dangers: Trend Micro

Join the PC World newsletter!

Error: Please check your email address.

Tags securitytrend microDesktop securitydata breachspywarefraudmalware

Struggling for Christmas presents this year? Check out our Christmas Gift Guide for some top tech suggestions and more.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Shopping.com

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?