IBM research has discovered a concerning development in some new Ice IX configurations that are targeting online banking customers in the U.K. and U.S. Ice IX is a modified variant of the Zeus financial malware platform.

In addition to stealing bank account data, these configurations are capturing information on victims’ telephone accounts. This allows attackers to divert calls from the bank that were intended for its customers to attacker-controlled phone numbers. The fraudsters are presumably executing fraudulent transactions using the stolen credentials and redirecting the bank’s post-transaction verification phone calls to professional criminal caller services that approve the transactions.

How Ice IX Logs In

In one attack captured by IBM researchers, at the point of login the malware steals the victim’s user ID and password as well as the answers to the user’s memorable information/secret question, date of birth and account balance.

Next, victims are asked to update their recorded phone numbers (home, mobile and work) and select the name of their service provider from a drop-down list. In this particular attack, the three most popular phone service providers in the U.K. are presented: British Telecommunications (BT), TalkTalk and Sky. Here’s an example of the webinjection the user sees in his or her browser:

To enable the attacker to modify the victim’s phone service settings, the malware then asks the victim to submit his or her telephone account number. This is very private and sensitive data — typically only known to the phone subscriber and the phone company — and is used by the phone company to verify the identity of the subscriber and authorize sensitive account modifications such as call forwarding. The fraudsters justify this request by stating that the information is required as part of a verification process caused by “a malfunction of the bank’s anti-fraud system with its landline phone service provider.”

Here are the webinject messages presented to BT, Sky and TalkTalk users:

Fraudsters are increasingly turning to these post-transaction attack methods to hide fraudulent activities from the victim and block email and phone communication from the bank. This allows attackers to circumvent security mechanisms that look for anomalies once transactions have already been executed by the user.

Deterministic detection security mechanisms, like IBM Security Trusteer Rapport, search for specific malware crime logic footprints before transactions are submitted and allow the online banking application to stop fraud by changing business flows (block money transfers, decline/add payee, limit amounts, etc.). Uniquely, they are not vulnerable to post-transaction attacks.

Thanks to Tanya Shafir from the IBM analysis team for providing the intelligence for this post.

More from Malware

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security research draws another link between the Raspberry Robin infections and the Russia-based cybercriminal group 'Evil Corp,' which is the same…