FRAMINGHAM 22 FEBRUARY 2011 - Cybercriminals in Eastern Europe have begun using a dangerous new malware program to steal from online bank accounts in the U.S.
The Trojan program, dubbed "OddJob," appears to be a work in progress, but is already different from many malware in at least two respects, according to Amit Klein, chief technology officer at security firm Trusteer, which discovered it.
Unlike other conventional hacking tools, OddJob does not require fraudsters to log into a user's online bank account to steal from it. Instead, the malware is designed to hijack a user's online banking session in real-time by stealing session ID tokens.
These are tokens issued by a bank to identify a user's online bank session. By stealing the tokens and embedding them into their own browsers, fraudsters can impersonate a legitimate user and access accounts while the user is is still active online. The access allows fraudsters to then conduct whatever banking operations the account holder can perform.
"The malware essentially allows the fraudster to share the session with the victim so that any activity the victim can see, the fraudster can see as well," Klein said.
The approach is different than typical man-in-the browser attacks where attackers use Trojans to steal login credentials that are then used to break into online accounts.
The second interesting feature in OddJob is its ability to keep an online banking session open and live even after users think they have logged out of their account. This allows criminals to extract money and continue other fraudulent activity even after the user thinks the session has ended.
"The fraudster has a keen interest in the session not being terminated. So in order to avoid that, the malware has the ability to detect logout attempts and to discard them," he said. The users will likely not notice the failed logout, or will assume the bank server is sluggish and shut their browser down without realizing that their sessions are still active.
Trusteer first came across OddJob last year during a fraud investigation for a bank. The company has been unable to openly talk about it until now because of investigations by law enforcement agencies, Klein said.
OddJob presently is programmed to steal session ID tokens from customers of dozens of specific banks in the U.S., Poland and Denmark. When customers log into their accounts using Microsoft's Internet Explorer or Mozilla's Firefox, OddJob grabs their session ID token and sends it in real-time to the Command-and-Control server where the session can be hijacked.
Sign up for Computerworld eNewsletters.