Improved Carberp banking malware will target North American banks, Group-IB says

Carberp authors are developing custom scripts for U.S. and Canadian banking websites, Group-IB researchers say

The creators of Carberp, a banking Trojan program used exclusively in Russian-speaking countries, have started to sell an improved version of the malware together with custom scripts that would allow cybercriminals to target U.S. online banking customers, according to researchers from Russian security firm Group-IB.

The Carberp malware first appeared in 2010 and started out as a private Trojan program used by a single gang.

In early 2011, its creators sold the malware's builder -- the tool used to customize the Trojan program -- for US$10,000 to a limited number of customers. This gave life to several Carberp-powered operations that targeted online banking users from Russia, Ukraine, Belarus, Kazakhstan, Moldova and other former Soviet Union states.

Between March and June this year, the leaders of the three largest Carberp cybercriminal groups were arrested in Russia. Group-IB assisted Russian law enforcement authorities in the investigations.

Last week, the creators of the Carberp malware, who have been silent since 2011, started advertising a new and improved version of the malware on an underground forum, security researchers from RSA said Friday in a blog post.

The Trojan program is offered on a monthly subscription-based model with prices ranging between $2,000 and $10,000 depending on the number of additional modules, or for a one-time fee of $40,000, which buys the builder application for a special Carberp version that has a bootkit -- boot sector rootkit -- component.

"At no point in cybercrime history has any developer asked such price for a banking Trojan," according to the RSA researchers.

On Friday, security researchers from Russian antivirus vendor Kaspersky Lab reported that several Carberp-related Android apps designed to steal online transaction authentication codes sent by banks to customers via SMS, were found on Google Play. This was the first time when malicious mobile components associated with Carberp had been found.

At the time, Denis Maslennikov, senior malware analyst at Kaspersky, said via email that the company's researchers have not yet seen Carberp variants targeting banks that are not located in Russian-speaking countries. However, according to Group-IB, that might not be the case for long.

Group-IB has reliable information that the Carberp creators are developing and selling custom "Web injects" -- scripts that define how banking malware interacts with targeted websites -- for the sites of major North American banks like Wells Fargo, Citibank, JP Morgan Chase, Bank of America, TD Bank and others, Andrey Komarov, Group-IB's head of international projects department, said Monday.

The Carberp creators are selling custom versions of the malware with Web injects that target specific banks, Komarov said via email. "We have samples of Carberp Web injects for banks in U.S. and Canada."

In addition, Carberp customers can develop their own custom Web inject if they know the API (application programming interface) and the proper Web inject structure, he said.

The Carberp authors will probably not get many customers, considering the malware's price, Komarov said. However, they will attract professional customers with experience in running money mule and cashout operations in the U.S., Canada and Australia, he said.

Tags: Group-IB, security, eset, spyware, fraud, kaspersky lab, malware

Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos SafeGuard Enterprise

Your central key for data protection

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.