IBM Security Trusteer researchers have recently discovered an infection campaign using a new variant of the banking Trojan Tinba that targets European banking customers. The latest version has been enhanced with several capabilities that significantly improve the malware’s effectiveness and resiliency.

Small and Free of Charge

Tinba is a truncation of “tiny banker” and, when first discovered in 2012, was the smallest banking Trojan in circulation by file size.

Tinba’s destiny took an interesting turn when its source code was publicly leaked in July 2011 in an apparent dispute between rival cybercriminals. Since the leak, various gangs have been able to rework the ready-made malicious code at no cost.

Security Intelligence reported in September of last year that, as a result of the proliferation of the source code, several campaigns using Tinba variations were launched in countries around the world, in many cases sporting significant improvements to the original code.

Latest European Tour

In May 2015, IBM Security Trusteer researchers discovered a Tinba infection campaign targeting Poland, Italy, the Netherlands and Germany. Nearly half of the recognized incidents were focused on Poland, with 45 percent of the security events able to be traced back to the country. Italy was a distant second at 21 percent, according to the research.

Credential Stealing and Fake Messages

When Tinba infects a computer and the user tries to log in to one of the targeted banks, Tinba’s webinjects are launched into action. Depending on the targeted bank, victims are presented with fake messages and Web forms asking for personal information, login credentials or requests to perform a funds transfer. The notice may even attempt to convince users that money has been added to their account accidentally and must be refunded immediately.

Tinba’s Fallback Mechanisms

In line with Trojan anti-research and resilience features, the author of this Tinba variation, wary of potential hijacking and takedowns, incorporated several fallback mechanisms to make sure the botnet remains intact. These safeguards include:

  • Public key signing to ensure that bot commands and updates can only come from the authorized botmaster;
  • Bots authenticating the updating server before accepting a new configuration;
  • A machine-dependent encryption layer for each bot to prevent security researchers from spoofing bots;
  • Bots communicating with hard-coded resource URLs and fallback to DGA-made URLs when necessary.

The Globalization of the Malware Threat

This latest Tinba campaign is just one of many malware threats that have migrated to Europe after previously targeting U.S. banks. Cybercriminals such as the Dyre gang have been able to overcome language barriers and adapt their tactics to attack local banks. While this trend may prove a challenge to many banks who have not yet hardened their defenses, it also provides an opportunity for those institutions to take advantage of the lessons learned having combated this malware elsewhere.

Read the white paper: Accelerating growth and digital adoption with seamless identity trust

More from Banking & Finance

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today