May 15, 2012 By Amit Klein 3 min read

IBM recently discovered a series of attacks being carried out by a P2P variant of the Zeus platform against some of the Internet’s leading online services and websites. The attacks are targeting users of Facebook, Gmail, Hotmail and Yahoo, as well as Visa and MasterCard, offering rebates and new security measures. The scams exploit the trust relationship between users and those well-known service providers to steal users’ debit card data.

Facebook

In the first attack against Facebook, the malware uses a webinject to present the victim with a fraudulent 20 percent cash back incentive to link their Visa or MasterCard debit card to their Facebook account. The scam claims that after registering their card information, the victim will earn cash back when they purchase Facebook points. The fake Web form prompts the victim to enter their debit card number, expiration date, security code and PIN.

Malware webinject presented to Facebook users

Gmail and Yahoo

In the attacks against Gmail and Yahoo users, Zeus offers an allegedly new way of authenticating via the 3D Secure service offered by the Verified by Visa and MasterCard SecureCode programs. To complete an online transaction, many merchants require cardholders to authenticate the transaction using their personal 3D Secure password. Visa and MasterCard cardholders can apply for a 3D Secure password with the bank that issued their debit or credit card.

The scam that targets Gmail and Yahoo users claims that by linking their debit card to their web mail accounts, all future 3D Secure authentication will be performed through Google Checkout and Yahoo Checkout, respectively. The fraudsters allege that by participating in the program the victim’s debit card account will be protected from fraud in the future. The victim is prompted to enter their debit card number, expiration date, security code and PIN. The attack is not compromising the 3D Secure service or authentication mechanism, but rather leveraging the Verified by Visa and MasterCard SecureCode brands to make the scam more credible.

Malware webinject presented to Gmail and Yahoo users, respectively

Hotmail

The attack against Hotmail users is similar to the Gmail and Yahoo scam. It claims that by registering for a free new security service, the victim can set up a 3D Secure-like password to protect their debit card from fraud. The offer states that the service will prevent purchases from being made on the Internet with the card unless the Hotmail account information and additional password are provided. The webinject requests the same debit card data (card number, expiration date, security code and PIN) as the previous two scams.

Malware webinject presented to Microsoft Hotmail users

This attack is a clever example of how fraudsters are using trusted brands, social networks, email hosts and debit card providers to get victims to lower their guards and surrender their debit card data. These webinjects are well crafted, both from a visual and content perspective, making it difficult to identify them as a fraud. It’s also ironic how in the Gmail, Hotmail and Yahoo scams, the fraudsters are using the fear of the very cyber crimes they are committing to prey on their victims.

More from Fraud Protection

What’s up India? PixPirate is back and spreading via WhatsApp

8 min read - This blog post is the continuation of a previous blog regarding PixPirate malware. If you haven’t read the initial post, please take a couple of minutes to get caught up before diving into this content. PixPirate malware consists of two components: a downloader application and a droppee application, and both are custom-made and operated by the same fraudster group. Although the traditional role of a downloader is to install the droppee on the victim device, with PixPirate, the downloader also…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today