August 14, 2012 By Amit Klein 2 min read

IBM recently discovered a sophisticated man-in-the-browser (MitB) enterprise attack that targets virtual private network (VPN) users at a major international airport hub.

Using the Citadel Trojan, criminals are targeting employees to steal their credentials for accessing internal airport applications. IBM has notified airport officials and the relevant government agencies of this attack. Due to the sensitive nature of these systems, the airport immediately disabled remote employee access through this VPN site; the site is currently down.

VPNs are often used to secure Internet connections between a business’s private network and a remote employee. VPNs provide users with secure remote access to applications and data that reside inside an enterprise’s firewall. However, once an attacker steals a victim’s VPN credentials, they can log in as the authorized user and have unfettered access to the information and resources associated with the account.

Man-in-the-Browser Attacks: Complex and Effective

These types of complex attacks use a combination of form-grabbing and screen-capture technologies to steal the victim’s username, password and the one-time passcode generated by a strong authentication product.

The first part of the attack uses form-grabbing to steal the username and password entered into the login screen. The second part of the attack relies on screen-capture capabilities to take a snapshot of the image presented to the victim by the strong authentication product.

The strong authentication product offers two authentication options: single channel and dual channel. The dual-channel mode sends users a one-time PIN via SMS or a mobile application. The single-channel mode is activated when the user selects the “Get Image” option at login. This prompts the strong authentication product to generate an on-screen CAPTCHA of 10 digits. The user then maps his or her original (static) password to the string of digits in the image to produce the one-time code.

This security measure prevents the form-grabber from capturing the actual static password. This is where the screen-capturing feature in Citadel kicks in. By capturing the image, the attacker uses the permutation of digits, along with the one-time code stolen by the form-grabber, to reproduce the static password.

Not Strong Enough

This is a clever use of form-grabbing and screen-grabbing techniques by attackers. It also demonstrates how enterprises that rely on strong authentication approaches are still at risk from targeted attacks if they lack cyber crime prevention security on endpoint devices.

This is especially true in the case of unmanaged or bring-your-own-device (BYOD) endpoints. Because these mobile devices are exposed to threats that would otherwise be filtered at the enterprise perimeter, they are much more vulnerable to infection from advanced malware like Citadel, Zeus or SpyEye. When an unmanaged, infected device connects to the enterprise via a VPN or some other remote access method, malware can circumvent strong authentication systems, as evidenced by the attack above.

The Citadel malware used in this attack is typically used to execute online banking and other forms of financial fraud. However, this is not the first time IBM has identified and reported on enterprises being targeted by screen-capturing/form-grabbing financial malware. This form of man-in-the-browser attack is especially troubling given the potential impact on air travel security and border control.

2014 Ponemon Study: The Economic Impact of Advanced Persistent Threats (APTs)

More from Fraud Protection

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today