UK Banks Targeted by Ramnit Malware and Social Engineering Schemes
May 01, 2013
A menacing variant of the Ramnit malware has emerged, posing a threat to the UK’s financial sector. Trusteer has identified a sophisticated Trojan attack method that injects highly convincing, interactive real-time messages into the web session of users logging into UK online banking. Originally discovered in 2010, Ramnit evolved in 2011 when researchers noted its incorporation of source code from the notorious Zeus banking Trojan.
Cybercriminals are increasingly leveraging social engineering tactics to exploit the security moves made by online banking and e-commerce users. This malware reportedly remains undetected by entering an idle sleep mode until a victim accesses their online bank account. At that moment, it activates and displays a fraudulent phishing message. Furthermore, Ramnit has been shown to bypass the bank’s one-time password (OTP) feature through a ‘Man in the Browser’ attack.
UK Financial Sector Targeted by Evolving Ramnit Malware and Social Engineering Tactics May 1, 2013 The UK financial industry is confronting a significant cybersecurity threat as a variant of the Ramnit malware has been identified targeting its infrastructure. Security firm Trusteer has unveiled a sophisticated Trojan-based attack that injects highly…
UK Banks Targeted by Ramnit Malware and Social Engineering Schemes
May 01, 2013
A menacing variant of the Ramnit malware has emerged, posing a threat to the UK’s financial sector. Trusteer has identified a sophisticated Trojan attack method that injects highly convincing, interactive real-time messages into the web session of users logging into UK online banking. Originally discovered in 2010, Ramnit evolved in 2011 when researchers noted its incorporation of source code from the notorious Zeus banking Trojan.
Cybercriminals are increasingly leveraging social engineering tactics to exploit the security moves made by online banking and e-commerce users. This malware reportedly remains undetected by entering an idle sleep mode until a victim accesses their online bank account. At that moment, it activates and displays a fraudulent phishing message. Furthermore, Ramnit has been shown to bypass the bank’s one-time password (OTP) feature through a ‘Man in the Browser’ attack.