Banks Gear Up For Highly Coordinated 'Operation Blitzkrieg' Cyberattack5:35 PM EST Fri. Dec. 14, 2012
The financial industry is gearing up for what might become the largest cybercrime event of 2013.
A figure in the Russian criminal underworld is in the process of hiring 100 botmasters to participate in "Project Blitzkrieg," which is believed to be targeting 30 financial institutions with a coordinated attack aimed at draining consumer bank accounts.
The recruitment efforts became publicly known in September, and while some industry insiders have speculated that the initiative might be a hoax or a law enforcement sting operation, McAfee Security has issued a report demonstrating that the groundwork is largely prepared and that beta testing has already taken place, using smaller numbers of victims in the U.S. and Romania.
The exploit will leverage a Trojan known as Gozi Prinimalka, which includes a series of customized variants of the four-year-old Gozi Trojan. The malware is optimized for the theft of banking passwords, and a coordinated attack is expected to occur sometime in the spring. According to researchers at McAfee, hundreds of such infections are currently known, and that number is believed to be the tip of the iceberg.
McAfee has already documented two different campaigns. The first pilot program involved 300 to 500 victims in the United States, and the second beta test involved approximately 120 individual systems and Romania.
"These are just the ones we know about," said McAfee threat researcher, Ryan Sherstobitoff. "The actual number is probably far higher than that. There's also a third [beta test] that is not included in our report because we don't have enough information yet, but we think that one is in the thousands."
The alleged architect of the campaign goes by the screen name, "vorVzakone," which translates from Russian as "thief in law." He has reportedly made available to the underworld series of screenshots depicting a control panel from which the attack will be coordinated. It is believed that a number of tactics will be used to emulate the victims' PC identifiers, and appeared to be a legitimate request from the user for the transfer of funds to mule accounts. Examples include a SOCKS proxy connection that is expected to hijack the IP address of each victim.
"The system is not only designed to extract money from victims' accounts, it also uses a form of DDoS," said Sherstobitoff. "This separate attack is not aimed at the banks' websites. It is rather a form of Skype phone flooding which is intended to bog down the customer service lines to prevent any sort of response to fraud claims, and also make the banks unable to reach their customers for verification while the money is being stolen. The phone lines are intended to be completely consumed while the operation is underway."
NEXT: Evidence Suggests Botmasters Are Prepped For Attack
McAfee's Sherstobitoff said some of the evidence suggests that customer service lines from the banks are already being loaded into the console for easy distribution to the botmasters participating in the attack.
"It's not that the Trojan itself is really unique," he added. "It's really the back-end system and the cooperation of others that will make this a crime machine to be concerned about. In a way, it's like Operation High Roller, which also stole money. But, High Roller attacked businesses, whereas this one attacks consumer accounts. Victims would have to jump through hoops to confirm the fraud, but in most cases, the financial institutions will ultimately eat the loss. But if this does reach critical mass, it can potentially be very destructive."
Sherstobitoff urges consumers to make sure that their antivirus protection remains up to date. Meanwhile, banks and other financial institutions have been urged to take measures to strengthen their customer authentication processes, as well as to engage anomaly detection software to identify any unusual account activity.
PUBLISHED DEC. 14, 2012