October 16, 2015 By Shane Schick 2 min read

Researchers are warning that usernames, passwords and other credentials of online banking users in Japan may be compromised thanks to a Trojan that builds off of previous vulnerabilities in Adobe Flash Player and Microsoft’s Internet Explorer (IE).

An alert from ESET, which provides online scanning tools, offered details on Brolux, a Trojan that cybercriminals are using to track online banking activity by monitoring the URLs consumers visit. Brolux works by installing a pair of configuration files that contain both URLs that can be cross-referenced and popular Japanese financial services firms’ window titles. If cybercriminals see an opportunity, potential victims are directed to a page that resembles the country’s Financial Services Agency or the Japanese Public Prosecutor’s Office.

As SecurityWeek pointed out, this is just the latest instance of malware creators targeting Japanese online banking users. Although the degree of organized cybercrime in the country is believed to be in its early stages, according to a study from Trend Micro, similar threats hitting customers of financial institutions include malware such as Neverquest, Tsukuba and Shifu.

One of the interesting aspects of Brolux is its use of previously reported bugs in Flash Player and the so-called Unicorn vulnerability in IE. We Live Security compared the malware’s distribution method through an adult website to Win32/Aibatook, which also focused on Japanese online banking customers. In this case, however, the site luring potential victims is aggregating pornographic images and videos from other sites.

Hopefully, anyone who hasn’t already updated or patched Flash Player and IE will do so as news of Brolux spreads. In the meantime, expect many similar threats to emerge as cybercriminals simply modify or tweak previous vulnerabilities and exploits to distribute malware. Shifu, for example, made use of the widely known Angler exploit kit to go after online banking users in the U.K. Other features in Shifu were also reportedly copied from previous Trojans.

In other words, cybercriminals are making no attempt to be original here; they’re simply being as persistent as possible in the hopes of gaining control of more personal information over time.

More from

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Quishing: A growing threat hiding in plain sight

4 min read - Our mobile devices go everywhere we go, and we can use them for almost anything. For businesses, the accessibility of mobile devices has also made it easier to create more interactive ways to introduce new products and services while improving user experiences across different industries. Quick-response (QR) codes are a good example of this in action and help mobile devices quickly navigate to web pages or install new software by simply scanning an image.However, legitimate organizations aren’t the only ones…

Cybersecurity Awareness Month: 5 new AI skills cyber pros need

4 min read - The rapid integration of artificial intelligence (AI) across industries, including cybersecurity, has sparked a sense of urgency among professionals. As organizations increasingly adopt AI tools to bolster security defenses, cyber professionals now face a pivotal question: What new skills do I need to stay relevant?October is Cybersecurity Awareness Month, which makes it the perfect time to address this pressing issue. With AI transforming threat detection, prevention and response, what better moment to explore the essential skills professionals might require?Whether you're…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today