August 14, 2012 By Amit Klein 2 min read

IBM recently discovered a sophisticated man-in-the-browser (MitB) enterprise attack that targets virtual private network (VPN) users at a major international airport hub.

Using the Citadel Trojan, criminals are targeting employees to steal their credentials for accessing internal airport applications. IBM has notified airport officials and the relevant government agencies of this attack. Due to the sensitive nature of these systems, the airport immediately disabled remote employee access through this VPN site; the site is currently down.

VPNs are often used to secure Internet connections between a business’s private network and a remote employee. VPNs provide users with secure remote access to applications and data that reside inside an enterprise’s firewall. However, once an attacker steals a victim’s VPN credentials, they can log in as the authorized user and have unfettered access to the information and resources associated with the account.

Man-in-the-Browser Attacks: Complex and Effective

These types of complex attacks use a combination of form-grabbing and screen-capture technologies to steal the victim’s username, password and the one-time passcode generated by a strong authentication product.

The first part of the attack uses form-grabbing to steal the username and password entered into the login screen. The second part of the attack relies on screen-capture capabilities to take a snapshot of the image presented to the victim by the strong authentication product.

The strong authentication product offers two authentication options: single channel and dual channel. The dual-channel mode sends users a one-time PIN via SMS or a mobile application. The single-channel mode is activated when the user selects the “Get Image” option at login. This prompts the strong authentication product to generate an on-screen CAPTCHA of 10 digits. The user then maps his or her original (static) password to the string of digits in the image to produce the one-time code.

This security measure prevents the form-grabber from capturing the actual static password. This is where the screen-capturing feature in Citadel kicks in. By capturing the image, the attacker uses the permutation of digits, along with the one-time code stolen by the form-grabber, to reproduce the static password.

Not Strong Enough

This is a clever use of form-grabbing and screen-grabbing techniques by attackers. It also demonstrates how enterprises that rely on strong authentication approaches are still at risk from targeted attacks if they lack cyber crime prevention security on endpoint devices.

This is especially true in the case of unmanaged or bring-your-own-device (BYOD) endpoints. Because these mobile devices are exposed to threats that would otherwise be filtered at the enterprise perimeter, they are much more vulnerable to infection from advanced malware like Citadel, Zeus or SpyEye. When an unmanaged, infected device connects to the enterprise via a VPN or some other remote access method, malware can circumvent strong authentication systems, as evidenced by the attack above.

The Citadel malware used in this attack is typically used to execute online banking and other forms of financial fraud. However, this is not the first time IBM has identified and reported on enterprises being targeted by screen-capturing/form-grabbing financial malware. This form of man-in-the-browser attack is especially troubling given the potential impact on air travel security and border control.

2014 Ponemon Study: The Economic Impact of Advanced Persistent Threats (APTs)

More from Fraud Protection

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

New Fakext malware targets Latin American banks

6 min read - This article was made possible thanks to contributions from Itzhak Chimino, Michael Gal and Liran Tiebloom. Browser extensions have become integral to our online experience. From productivity tools to entertainment add-ons, these small software modules offer customized features to suit individual preferences. Unfortunately, extensions can prove useful to malicious actors as well. Capitalizing on the favorable characteristics of an add-on, an attacker can leverage attributes like persistence, seamless installation, elevated privileges and unencrypted data exposure to distribute and operate banking…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today