IBM research has discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the U.K. and U.S. Ice IX is a modified variant of the Zeus financial malware platform.

In addition to stealing bank account data, these configurations are capturing information on victims’ telephone accounts. This allows attackers to divert calls from the bank that were intended for its customers to attacker-controlled phone numbers. The fraudsters are presumably executing fraudulent transactions using the stolen credentials and redirecting the bank’s post-transaction verification phone calls to professional criminal caller services that approve the transactions.

How Ice IX Logs In

In one attack captured by IBM researchers, at the point of login the malware steals the victim’s user ID and password as well as the answers to the user’s memorable information/secret question, date of birth and account balance.

Next, victims are asked to update their recorded phone numbers (home, mobile and work) and select the name of their service provider from a drop-down list. In this particular attack, the three most popular phone service providers in the U.K. are presented: British Telecommunications (BT), TalkTalk and Sky. Here’s an example of the webinjection the user sees in his or her browser:

To enable the attacker to modify the victim’s phone service settings, the malware then asks the victim to submit his or her telephone account number. This is very private and sensitive data — typically only known to the phone subscriber and the phone company — and is used by the phone company to verify the identity of the subscriber and authorize sensitive account modifications such as call forwarding. The fraudsters justify this request by stating that the information is required as part of a verification process caused by “a malfunction of the bank’s anti-fraud system with its landline phone service provider.”

Here are the webinject messages presented to BT, Sky and TalkTalk users:

Fraudsters are increasingly turning to these post-transaction attack methods to hide fraudulent activities from the victim and block email and phone communication from the bank. This allows attackers to circumvent security mechanisms that look for anomalies once transactions have already been executed by the user.

Deterministic detection security mechanisms, like IBM Security Trusteer Rapport, search for specific malware crime logic footprints before transactions are submitted and allow the online banking application to stop fraud by changing business flows (block money transfers, decline/add payee, limit amounts, etc.). Uniquely, they are not vulnerable to post-transaction attacks.

Thanks to Tanya Shafir from the IBM analysis team for providing the intelligence for this post.

More from Malware

Ransomware Renaissance 2023: The Definitive Guide to Stay Safer

2 min read - Ransomware is experiencing a renaissance in 2023, with some cybersecurity firms reporting over 400 attacks in the month of March alone. And it shouldn’t be a surprise: the 2023 X-Force Threat Intelligence Index found backdoor deployments — malware providing remote access — as the top attacker action in 2022, and aptly predicted 2022’s backdoor failures would become 2023’s ransomware crisis. Compounding the problem is the industrialization of the cybercrime ecosystem, enabling adversaries to complete more attacks, faster. Over the last…

2 min read

BlackCat (ALPHV) Ransomware Levels Up for Stealth, Speed and Exfiltration

9 min read - This blog was made possible through contributions from Kat Metrick, Kevin Henson, Agnes Ramos-Beauchamp, Thanassis Diogos, Diego Matos Martins and Joseph Spero. BlackCat ransomware, which was among the top ransomware families observed by IBM Security X-Force in 2022, according to the 2023 X-Force Threat Intelligence Index, continues to wreak havoc across organizations globally this year. BlackCat (a.k.a. ALPHV) ransomware affiliates' more recent attacks include targeting organizations in the healthcare, government, education, manufacturing and hospitality sectors. Reportedly, several of these incidents resulted…

9 min read

Ex-Conti and FIN7 Actors Collaborate with New Backdoor

15 min read -   April 27, 2023 Update This article is being republished with modifications from the original that was published on April 14, 2023, to change the name of the family of malware from Domino to Minodo. This is being done to avoid any possible confusion with the HCL Domino brand. The family of malware that is described in this article is unrelated to, does not impact, nor uses HCL Domino or any of its components in any way. The malware is…

15 min read

When the Absence of Noise Becomes Signal: Defensive Considerations for Lazarus FudModule

7 min read - In February 2023, X-Force posted a blog entitled “Direct Kernel Object Manipulation (DKOM) Attacks on ETW Providers” that details the capabilities of a sample attributed to the Lazarus group leveraged to impair visibility of the malware’s operations. This blog will not rehash analysis of the Lazarus malware sample or Event Tracing for Windows (ETW) as that has been previously covered in the X-Force blog post. This blog will focus on highlighting the opportunities for detection of the FudModule within the…

7 min read