Linux 'Hand of Thief ' bank Trojan is not viable malware, says RSA

Protoype's capabilities oversold

The 'Hand of Thief' (HoT) Linux banking Trojan that was offered for sale on the criminal underground this summer is a primitive "prototype" that poses little real threat to users of the OS, a new analysis by RSA has reported.

Having tested the programme, it now looks as if the individual offering it for sale on Russian crime forums at a premium price was doing an ambitious sales job on its imagined capabilities.

The firm's researchers fired up HoT's Windows bot builder programme, using it to create a working binary for test purposes. Immediately, they started noticing inefficiencies in its design such as the need to generate a new binary every time basic configuration changes were made.

Under Fedora 19, while HoT was able to infect the machine but also caused the Firefox Linux browser to crash and freeze, and turned out to capture unnecessary amounts of data that would have complicated the task of stealing credentials.

Under Ubuntu 12.04, HoT failed to work at all thanks to this distribution's ptrace scope protection. Even disabling this made little difference as the browser suffered similar crashes and the malware proved unable to capture anything.

A more general weakness was the lack of commercial exploit packs for Linux that are commonly used to automate drive-by campaigns against Windows users, RSA said.

The overall impression is of a piece of malware that fails to live up its marketing hype.

"Hand of Thief has come to the cybercrime underground at a time when commercial Trojans are high in demand, stirring some excitement amongst criminals," said RSA's Yotam Gottesman, who conducted the analysis.

"Although it initially appeared to be a compelling new Trojan entrant, RSA's in-depth analysis of the code proves it is a prototype more than true commercially viable malware, crashing the browsers on the infected machines and displaying overall inability to properly grab data," he said.

The malware could also easily be removed from an infected Linux system simply by deleting files dropped during install.

"Hand of Thief's developer claims that he is in the final stages of implementing a web-injections mechanism, but since the Form grabber he designed is not functional on the browsers he claims to have tested, the injections are not very likely to work either."

Linux malware, of course, is incredibly rare and the dramatic-sounding Hand of Thief malware would have been the first designed to attack online bank access on the OS.

HoT was first noticed for sale earlier this summer on a Russian forum for $2,000 (£1,250) a pop. Its appearance was taken as a sign that despite its small and generally specialised user base malware writers might be warming up to the eccentric idea that Linux was a platform worth attacking.

To date, HoT has not been detected in real-world attacks.

Join the CSO newsletter!

Error: Please check your email address.

Tags FirefoxPersonal Techsecurityfedoraubuntu

More about FedoraLinuxRSAUbuntu

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place