Freeware Files | Download Free Software

Sunday, 30 March 2014 00:00

Gameover malware targets accounts on employment websites

Rate this item
(2 votes)

A new variant of the Gameover computer Trojan is targeting job seekers and recruiters by attempting to steal log-in credentials for Monster.com and CareerBuilder.com accounts.

Gameover is one of several Trojan programs that are based on the infamous Zeus banking malware, whose source code was leaked on the Internet in 2011.

Like Zeus, Gameover can steal log-in credentials and other sensitive information by injecting rogue Web forms into legitimate websites when accessed from infected computers.

The ability to inject content into browsing sessions in real time has traditionally been used by computer Trojans to steal online banking credentials and financial information. However, cybercriminals are increasingly using this technique to compromise other types of accounts as well.

For example, in February, researchers from security firm Adallom found a Zeus variant that stole Salesforce.com log-in credentials and scraped business data from the compromised accounts.

The latest development involves a new Gameover variant that contains a configuration file to target Monster.com accounts, one of the largest employment websites in the world, security researchers from antivirus firm F-Secure said Tuesday in a blog post.

“A computer infected with Gameover ZeuS will inject a new ‘Sign In’ button [into the Monster.com sign-in page], but the page looks otherwise identical,” they said.

After the victims authenticate through the rogue Web form the malware injects a second page that asks them to select and answer three security questions out of 18. The answers to these questions expose additional personal information and potentially enable attackers to bypass the identity verification process.

Targeting Monster.com is a new development, but the Gameover malware had already been targeting CareerBuilder.com, another large employment website, for some time.

Recruiters with accounts on employment websites should be wary of irregularities on log-in pages, especially if those accounts are tied to bank accounts and spending budgets, the F-Secure researchers said. “It wouldn’t be a bad idea for sites such as Monster to introduce two factor authentication beyond mere security questions.”

The authors of the Gameover Trojan program have been particularly active recently. In early February researchers from security firm Malcovery Security reported that a new variant of Gameover was being distributed as an encrypted .enc file in order to bypass network-level defenses. Later that month researchers from Sophos detected a Gameover variant with a kernel-level rootkit component that protected its files and processes, making it harder to remove.

Unlike most other Zeus spinoffs, Gameover is also using peer-to-peer technology for command-and-control instead of traditional hosted servers, which improves its resilience to takedown efforts by security researchers.

Source

Subscribe via RSS or Email:

 
Read 1302 times Last modified on Sunday, 30 March 2014 10:03
Panagiotis K.

"Hi there , my name is Panagiotis K. and i like writing articles about computers and technology. Do not hesitate to share your ideas with me and add your comments."

 

  1. Latest News
  2. Most Popular
  3. Top Rated
  4. Latest Comments
  • Michael A
    Why they do not shut down the company that provides the faulty patchwork systems that make such malware first possible? No, not because of a faulty ...

    Read more...

     
  • Moubreb
    The people at any router between You and facebook can read Your communication if: 1. You're using an http: connection 2. A fake facebook certificate ...

    Read more...

     
  • theoctagon
    You could always just use what's already baked in: Android Device Manager. https://www.google.com/android/devicemanager

    Read more...

     
  • Michael A
    AFAIR the patch was available one day after the discovery of heartbleed. That normal with Free Software. Only mislead users of commercial scrap have ...

    Read more...

next
prev

Quick Search

Powered by Liquidtroll
Prev Next

What Is Computer Clothes And How They Will Change Our Future

28-02-2012 Hits:2279 Latest Panagiotis K. - avatar Panagiotis K.

What Is Computer Clothes And How They Will Change Our Future

The portability need of a computer system is always a must for most people, so scientists have already started to develop new kind of portable computers. This is electronic clothing. These...

Installing Adobe Flash Player 64-bit How to on Ubuntu 11.04

31-12-2011 Hits:4390 Linux Vasia L. - avatar Vasia L.

Installing Adobe Flash Player 64-bit How to on Ubuntu 11.04

The proceed from tutorial will teach you how to install the 64-bit edition of the Adobe Flash Player 11 plugin on the Ubuntu 11.04 (Natty Narwhal) operating system. Well, I guess...

How to selectively delete browser history

07-05-2014 Hits:858 Software Vasia L. - avatar Vasia L.

How to selectively delete browser history

Rather than delete your entire browsing history after visiting a website you want to keep secret, there’s an easy way to remove individual sites.

The... End of Skyrim Has Come

20-04-2013 Hits:1158 Games Panagiotis K. - avatar Panagiotis K.

The... End of Skyrim Has Come

Skyrim, is one of the best games of 2011, having taken a huge number of awards. For many it is one of the best games that have occurred regardless of the...

Windows XP registry hack keeps security updates rolling for the dead operat…

31-05-2014 Hits:1484 How To Panagiotis K. - avatar Panagiotis K.

Windows XP registry hack keeps security updates rolling for the dead operating system

Microsoft stopped supporting Windows XP in April, but a simple registry hack lets users continue to get security updates. The hack, as reported by ZDNet, fools Microsoft into thinking the system...