Follow on Google News News By Tag Industry News News By Place Country(s) Industry News
Follow on Google News | A good Carberp is hard to findFinancial malware threat is growing says Context researchers
By: Context Information Security In most cases Carberp will persist undetected by antivirus software on the infected machine using advanced stealth, anti-debugging and rootkit techniques and is controlled from a central administrator control panel that allows the attacker to mine the stolen data. Carberp is also part of a botnet that can take full control over infected hosts, while its complicated infection mechanisms and extensive functionality make it a prime candidate for more targeted attacks. The malware uses multiple layers of obfuscation and encryption to remain hidden and prevent analysis. Once embedded and decrypted, the real infection begins with malicious file dropping and process injection steps that provide a backdoor to the host under attack. “The advanced infection capabilities of Trojans such as Carberp require detailed knowledge of how they operate to detect and analysis attacks,” says Michael Jordon, research and development manager at Context. “While many banks are now using tools such as Rapport from Trusteer to mitigate the risk of financial malware by protecting web communication with customers and preventing the stealing of account credentials, we need to stay one step ahead or at least keep pace with the malware developers to reduce their impact.” While there is a large body of knowledge around Zeus and Spyeye, the information security industry is still building up detailed picture of newer Trojans such as Carberp. Context researchers are at forefront of this work and have published a series of blogs to detail the workings of new generation financial malware and provide advice how it is possible to detect infection and mitigate the threats. The latest blog focused on, ‘From Infection to Persistence’ About Context Context Information Security is an independent security consultancy specialising in both technical security and information assurance services. Founded in 1998, the company’s client base has grown steadily based on the value of its product-agnostic, holistic approach and tailored services combined with the independence, integrity and technical skills of its consultants. The company’s client base now includes some of the most prestigious blue chip companies in the world, as well as government organisations. As best security experts need to bring a broad portfolio of skills to the job, Context staff offer extensive business experience as well as technical expertise to deliver effective and practical solutions, advice and support. Context reports always communicate findings and recommendations in plain terms at a business level as well as in the form of an in-depth technical report. www.contextis.com Issued by: Context Information Security, Tel: + 44 (0)20 7537 7515, email: blogs[at]contextis[ www.contextis.com For more information for editors, please contact: Peter Rennison / Allie Andrews PRPR, Tel + 44 (0)1442 245030 / 07831 208109 pr[at]prpr[dot] Distributed on behalf of PRPR by NeonDrum news distribution service (http://www.neondrum.com) # # # NeonDrum is a targeted online news release distribution and monitoring service for PR professionals. Our mission is simple: to boost your online news coverage and get you seen on the web by the people that matter. End
Account Email Address Account Phone Number Disclaimer Report Abuse
|
|