October 16, 2015 By Shane Schick 2 min read

Researchers are warning that usernames, passwords and other credentials of online banking users in Japan may be compromised thanks to a Trojan that builds off of previous vulnerabilities in Adobe Flash Player and Microsoft’s Internet Explorer (IE).

An alert from ESET, which provides online scanning tools, offered details on Brolux, a Trojan that cybercriminals are using to track online banking activity by monitoring the URLs consumers visit. Brolux works by installing a pair of configuration files that contain both URLs that can be cross-referenced and popular Japanese financial services firms’ window titles. If cybercriminals see an opportunity, potential victims are directed to a page that resembles the country’s Financial Services Agency or the Japanese Public Prosecutor’s Office.

As SecurityWeek pointed out, this is just the latest instance of malware creators targeting Japanese online banking users. Although the degree of organized cybercrime in the country is believed to be in its early stages, according to a study from Trend Micro, similar threats hitting customers of financial institutions include malware such as Neverquest, Tsukuba and Shifu.

One of the interesting aspects of Brolux is its use of previously reported bugs in Flash Player and the so-called Unicorn vulnerability in IE. We Live Security compared the malware’s distribution method through an adult website to Win32/Aibatook, which also focused on Japanese online banking customers. In this case, however, the site luring potential victims is aggregating pornographic images and videos from other sites.

Hopefully, anyone who hasn’t already updated or patched Flash Player and IE will do so as news of Brolux spreads. In the meantime, expect many similar threats to emerge as cybercriminals simply modify or tweak previous vulnerabilities and exploits to distribute malware. Shifu, for example, made use of the widely known Angler exploit kit to go after online banking users in the U.K. Other features in Shifu were also reportedly copied from previous Trojans.

In other words, cybercriminals are making no attempt to be original here; they’re simply being as persistent as possible in the hopes of gaining control of more personal information over time.

More from

Remote access risks on the rise with CVE-2024-1708 and CVE-2024-1709

4 min read - On February 19, ConnectWise reported two vulnerabilities in its ScreenConnect product, CVE-2024-1708 and 1709. The first is an authentication bypass vulnerability, and the second is a path traversal vulnerability. Both made it possible for attackers to bypass authentication processes and execute remote code.While ConnectWise initially reported that the vulnerabilities had proof-of-concept but hadn’t been spotted in the wild, reports from customers quickly made it clear that hackers were actively exploring both flaws. As a result, the company created patches for…

Evolving red teaming for AI environments

2 min read - As AI becomes more ingrained in businesses and daily life, the importance of security grows more paramount. In fact, according to the IBM Institute for Business Value, 96% of executives say adopting generative AI (GenAI) makes a security breach likely in their organization in the next three years. Whether it’s a model performing unintended actions, generating misleading or harmful responses or revealing sensitive information, in the AI era security can no longer be an afterthought to innovation.AI red teaming is emerging…

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today