June 26, 2013 By Etay Maor 2 min read

Earlier this week, IBM reported that the Carberp malware source code was on sale in Russian forums. Since then, the source code was leaked and is now available to criminals and researchers alike for free.

The leaked Carberp source code includes an “anti-Rapport” function as well as an old copy of IBM Security Trusteer Rapport’s installer for testing purposes. Over the years, we’ve seen many anti-Rapport modules incorporated into different malware strains. It started back in 2009 with a series of anti-Rapport modules incorporated into Zeus, then a couple of anti-Rapport modules incorporated into SpyEye. It has now been incorporated into different malware strains, including Carberp. In terms of functionality, these modules try to achieve one of three main goals:

  • Prevent Trusteer Rapport from installing on the computer
  • Remove Trusteer Rapport from the computer
  • Avoid one or more of Rapport’s browser protection mechanisms

Over the years, we’ve learned how to effectively fight these attempts with a combination of strong intelligence capabilities, multiple layers of protection and rapid response capabilities.

Just as with previous attempts, Trusteer Rapport protects users from Carberp and is not affected by the anti-Rapport function. This was true before the Carberp source code leak and is still true now.

Learning More About Carberp

IBM intelligence operations collect current threat data from tens of millions of protected endpoints and other sources around the world. Our special response teams track every piece of financial malware 24/7 and can swiftly analyze it and develop countermeasures. By designing an infrastructure that allows for maximum flexibility, Trusteer Rapport can quickly adapt to any change in the threat landscape and shut down cyber criminals’ window of opportunity. As it combats sophisticated financial malware, Trusteer Rapport represents a serious roadblock to malware-based fraud. We take great pride in the fact that criminal groups see us as a threat to their livelihood and are constantly trying to find ways around us. We also remain vigilant and keep enhancing our intelligence capabilities, product functionality and operational processes.

Update: July 25, 2013

A French researcher was able to find a scenario in which our Carberp protection mechanism didn’t kick in. While we believe this is a rare scenario, we activated another layer to protect against it. We would like to thank this researcher for his help and cooperation.

More from Malware

Ongoing ITG05 operations leverage evolving malware arsenal in global campaigns

13 min read - Summary As of March 2024, X-Force is tracking multiple ongoing ITG05 phishing campaigns featuring lure documents crafted to imitate authentic documents of government and non-governmental organizations (NGOs) in Europe, the South Caucasus, Central Asia, and North and South America. The uncovered lures include a mixture of internal and publicly available documents, as well as possible actor-generated documents associated with finance, critical infrastructure, executive engagements, cyber security, maritime security, healthcare, business, and defense industrial production. Beginning in November 2023, X-Force observed…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Hive0051’s large scale malicious operations enabled by synchronized multi-channel DNS fluxing

12 min read - For the last year and a half, IBM X-Force has actively monitored the evolution of Hive0051’s malware capabilities. This Russian threat actor has accelerated its development efforts to support expanding operations since the onset of the Ukraine conflict. Recent analysis identified three key changes to capabilities: an improved multi-channel approach to DNS fluxing, obfuscated multi-stage scripts, and the use of fileless PowerShell variants of the Gamma malware. As of October 2023, IBM X-Force has also observed a significant increase in…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today