SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Man-in-the-Browser Attacks

  Mário Almeida      Umit Buyuksahin
Emmanouil Dimogerontakis    Aras Tarhan

           December 20, 2011
Contents

1 Background                                                                                                  2

2 Introduction                                                                                                3
  2.1 The Risk in Man-in-the-Browser Attack                   .   .   .   .   .   .   .   .   .   .   .   .   4
  2.2 Global Threat of Man-in-the-Browser . .                 .   .   .   .   .   .   .   .   .   .   .   .   4
  2.3 Evaluation . . . . . . . . . . . . . . . . .            .   .   .   .   .   .   .   .   .   .   .   .   5
  2.4 Point of Attacks . . . . . . . . . . . . .              .   .   .   .   .   .   .   .   .   .   .   .   6

3 Background & Overview of the Method of Attack                                                                8
  3.1 The Method of Attack . . . . . . . . . . . . . . . . .                              .   .   .   .   .   10
      3.1.1 Phase 1: Infection . . . . . . . . . . . . . . .                              .   .   .   .   .   10
      3.1.2 Phase 2: Transaction Takeover . . . . . . . .                                 .   .   .   .   .   11
  3.2 Banking Malware Example . . . . . . . . . . . . . .                                 .   .   .   .   .   13

4 Banking Trojans                                                                                             14
  4.1 Banking trojans capabilities . .    .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   15
  4.2 Anatomy of an e-fraud incident      .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   16
  4.3 Zeus configuration files . . . . .    .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   16
  4.4 Domain Generation Algorithms        .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   17
  4.5 P2P botnets . . . . . . . . . . .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   18
  4.6 Social Engineering . . . . . . .    .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   18
  4.7 Man-In-The-Mobile . . . . . . .     .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   19
  4.8 Tatanga . . . . . . . . . . . . .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   19
  4.9 Banking trojans statistics . . .    .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   .   21

5 Counter Measures                                                          23
  5.1 Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
  5.2 Passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
  5.3 Combination of Active and Passive counter Measures . . . . . 25




                                      1
Chapter 1

Background

Initially, online Fraudsters (phishers) used social engineering techniques to
try to get personal information of customer by sending emails in order to
steal money from their Internet banking account. These information can be
passwords or bank account details, could be further used for other criminal
activities. For example, the fraudsters may intend to leave the victims information
behind after they have successfully committed the crime. Therefore polices
can suspect the visible evidence which belongs to victims as a suspicious
criminal. Fraudsters are using newer and more advanced methods to target
online customers. One of the latest and most dangerous methods being
developed and deployed is the use of Trojans to launch man-in-the-Browser
(MITB) attacks. Shortly, a Man-in-the- Browser attack occurs when malicious
code infects an Internet browser. The code modifies actions performed by the
computer user and, in some cases, is able to initiate actions independently
of the customer. When a customer logs onto their bank account, using an
infected Internet browser is enough to trigger illicit transactions that result
in online theft.




                                      2
Chapter 2

Introduction

Firstly, online fraudulences have been introduced as a use of social engineering
technique in which potential victims are persuaded to obtain their confidential
information, such as usernames, passwords, and bank account details, to a
return email. General type of this attack is extended by creating fraudulent
web pages to convince the customers to believe that they are on the legitimate
websites of banking. When information of customer has been submitted
through the form provided fraudulent web pages, these information is been
sent to the online fraudsters. There are some kind of spying techniques that
are used to monitor the customers banking information claimed such as :
   • screenshot and video capture
   • code injection of fraudulent pages or form fields
   • redirecting website
   • keystroke logging
Sometimes, in order to obtain customers information can be combined with
multiple penetrating techniques; for instance, by using the screenshot and
video capture to monitor the users activity and using the keystroke logging
to record passwords or information.
    Subsequently, on of the latest and more dangerous approach of online
fraudulences technology such as a Trojan horse has been released. It operates
by becoming embedded in a users Internet browser and later steals confidential
information and sends it back to the online fraudsters.
    A number of Trojan families are used to conduct Man-in-the-Browser
attacks including Zeus, Adrenaline, Sinowal, and Silent Banker. Some MITB
Trojans are so advanced that they have streamlined the process for committing
fraud, programmed with functionality to fully automate the process from
infection to cash out.
    Man-in-the-Browser and Man-in-the-Middle Attacks: Although Man-in-
the-Middle attacks (MitM) and man-in-the-Browser (MitB) attacks have

                                       3
same idea based on controlling the Internet traffic between client and server,
these attacks use different ways to carry out the attack. Unlike Man-in-the-
Middle attack, man-in-the-Browser attacks placed customers browser and
manipulate the outgoing and ingoing traffic after the authentication process
of customers processes.


2.1    The Risk in Man-in-the-Browser Attack
The most obvious and most dangerous properties of Man-in-the-Browser is
that hard to detect and, in many cases, succeed in causing damage completely
surreptitiously.
    Following are some of reasons why MITB attacks pose high risk:

   • Computers can be infected easily: Especially, while customers are browsing
     or downloading media and other files, they are encouraged to install
     updated versions of software. These requests are so common, that
     many clients automatically accept and customers do not notice fine
     differences between malware program and normal program. Thus, they
     may download malware and their computers unknowingly are infected.

   • Detection is hard : Since malwares are produced by using some kind
     of toolkit that support variation of malicious code , they are hard to
     detect .

   • Traditional Strong Authentication is inadequate: Traditional Strong
     authentication validates that a person logging on to an online resource
     is indeed who he or she claims to be. When the customer wants to
     make an online transaction, the infected browser carries out illicit
     transactions covertly - neither the customer, nor the bank, are aware
     that anything irregular is happening.

   • Traditional Anti-Fraud Mechanisms are Not Effective: Since risk-based
     anti-fraud tools just focus on user authentication and transaction validation,
     they do not detect whether a transaction was initiated by malware or
     not, there is a high risk.


2.2    Global Threat of Man-in-the-Browser
MitB attacks are not contained to one region or geography; They are a
global threat, affecting all regions of the world. However, they are especially
prevalent in areas where two-factor authentication is densely deployed. Today,
MitB attacks are increasing in their deployment and scale:

   • In the United Kingdom, banks are suffering an increasing number
     of MITB attacks. One financial institution alone reported a loss of

                                      4
600,000 pounds as a result of a single attack by the PSP2-BBB Trojan.3
      European countries such as Germany, the Netherlands, Spain, France,
      and Poland have deployed two-factor authentication in the last few
      years, which have attracted a rise in the numbers of MITB attacks in
      these regions. Germany has been particularly hard hit by an abundance
      of MITB attacks as it is one of the few successful paths to commit online
      banking fraud in the country. Banking innovations such as the Single
      Euro Payments Area (SEPA) and pressure to deliver faster payments
      have also increased exposure to transaction fraud. The increased ease
      and speed of moving money is advantageous for legitimate transactions,
      but reduces the flexibility to investigate and prevent suspicious transactions.

   • In U.S. financial institutions are attacked by MITB; however, the
     threat has been mainly confined to commercial banking or high net
     worth customers. Because one-time password authentication is not
     very common amongst consumers in the U.S., MITB attacks against
     the general consumer public are less common compared to the volume
     experienced by consumers in Europe. However, as security defenses
     increase and the ability to infect more machines with MITB Trojans
     increases the expected number of attacks on US retail banking institutions
     is also expected to rise.

   • Financial institutions in Australia, Asia and Latin America are increasingly
     deploying two-factor authentication for their online banking users, and
     as a result, have experienced an increasing number of MITB attacks.


2.3    Evaluation
Man in the browser is also called a proxy Trojan or a password pinching
Trojan. It combines the use of online fraudulences approaches with a Trojan
horse technology, put in a customers browser, to modify, capture, and/or
add an additional information on web pages without the customers and the
hosts knowledge.
    Man-in-the-Browser Trojans commonly perform what is known as session
hijacking abusing a legitimate users session with the site being accessed
while the user is logged into their account. By hijacking a session in this
way, all actions performed by the Trojan actually become part of the users
legitimate session such as conducting a malicious activity (i.e., a fraudulent
money transfer, changing a postal address) or even injecting JavaScript code
that can then perform this automatically. The basic flow of a MITB attack
is as follows:

  1. A consumer gets infected with a Trojan capable of launching an MITB
     attack.


                                       5
2. Upon the initiation of a legitimate online transaction, the Trojan is
     triggered into action and launches its MITB functionalities

  3. The user passes all authentication stages, including any two-factor
     authentication when needed. The Trojan wait silently for successful
     login and/or transaction authorization.

  4. The Trojan manipulates the transaction details payee, and sometimes
     the amount. In most cases the legitimate payee account is replaced
     with a mule account that the fraudsters can use.

  5. By using social engineering techniques the user is unaware that they
     are being impacted. The Trojan displays fake pages to the user, which
     may show the transaction details as originally entered by the user.
     If additional authentication is necessary to complete the transaction,
     the Trojan will interact with the user and ask the user to enter their
     authentication credentials in real-time to approve the transaction.


2.4    Point of Attacks
It is known that Online Fraudsters can successfully target to Firefox, Internet
Explorer and Opera , on the Windows, Linux and MacOS X Platform by
using Trojans.The trojans can do the following:
     In the Man-in-the-Browser attacks, Trojans uses some kind of properties
of Internet web browsers for this purpose:

   • Browser Helper Objects: These are dynamically-loaded libraries (dll)
     loaded by Internet Explorer(IE) upon start-up. They run inside IE, and
     have full access to IE and full access to the DOM tree, etc. Developing
     BHOs is very easy.

   • Extensions: It is similar to Browser Helper Objects for other Browsers
     such as Firefox (hereafter, both will be referred to as extensions).
     Developing Extensions is easy. UserScripts Scripts that are running in
     the browser (Firefox/Greasemonkey+Opera). Developing UserScripts
     is very easy.

   • API-Hooking: This technique is a Man-in-the-Middle attack between
     the application (.exe) and the dlls that are loaded up, both for application
     specific dlls such as extensions and Operating System dlls. For example
     if the SSL engine of the browser is a separate dll, then API-Hooking
     can be used to modify all communication between the browser and the
     SSL engine. Developing API Hooks is difficult.




                                      6
Figure 2.1: A good example this type of attack is the breach of Paul
McCartneys fan page. In April 2009, the site was hacked for two days and
all visitors were silently infected with a variant of a MITB Trojan.




                                   7
Chapter 3

Background & Overview of the
Method of Attack

The fraudulent transaction is done from victims computer. It is made during
the time the victim works with the related site. It is done silently without
asking the victim for anything. Man-in-the-browser also sometimes called a
proxy Trojan operates from within the Web browser by:

   • hooking key Operating System and Web browser APIs,

        – When the Internet Explorer opens a connection to the Internet, it
          will call a function named InternetConnect which resides within
          the wininet.dll module that every Windows installation has MITB
          Trojans will now just hook into this first call between the Internet
          Explorer Application and the Windows System, so that the Trojan
          get full control over everything that is transmitted in this call.
        – On Mac, If a web browser is using the system API to manage its
          Internet connections, then malware simply needs to hook CFReadStreamOpen(),
          CFReadStreamRead() or CFReadStreamWrite() in a similar way
          to the one described above.
        – Hooking method works as follows; it jumps to its own codebase so
          that, the malicious code is executed. It needs to make sure that
          the original code is called. Otherwise, no internet connection
          would be established.

   • inserting advanced HTML/JavaScript Injections and utilising common
     facilities provided to enhance browser capabilities

        – Firefox extensions provide functionality to capture and edit HTTP/S
          forms data when submitted to and received from the web server.
          An attacker can change the values of form elements without knowledge
          of the user. Even when the HTTPS protocol is used, an extensions


                                     8
code can change the secured fields of a form before encryption
  and after decryption of data. This allows Man-in-the-Browser
  attack possible through malicious Firefox extensions. When a user
  submits a form, an extension can intercept the form submission
  and change its values. When a response arrives from the server,
  again extension can intercept the response and can change it as
  required. It do not make any difference whether the secured
  channel is used or not, whether form request is POST or GET.
  Since, the changes are made by the extension in the browser both
  during request and response, it is not observable by a user and
  difficult to detect. Examples below are some operations that can
  be done through HTML/JavaScript Injections
– Persistent Storage: Persistent storage can be used if you want to
  save the current account balance for later use. Internet Explorer
  actually provides a nice interface for localStorage and globalStorage
  that can be used for exactly this purpose.If thats not possible
  (e.g. if you run Firefox), then they simply create a new content
  element (thats a <DIV> element called customStorage) where
  they store the information.Access to the persistent store is done
  via a JavaScript function where you can specify whether you want
  to read, write or delete the name and the value of the information
  to be stored together with an expiry.
– Getting the actual cash balance for the current account.
– Replacing the login button with a malicious login button.
– Change account balance display (to remove fraudulent transaction
  amount. JavaScript will get the fraudulent amount from local
  storage into a variable. The correct HTML of the fake amount
  (obviously the current balance plus the fraudulent amount) will
  be written to the HTML.
– Remember the last login date and replace the "real" last login date
  with a fake one. When called, this will walk through the content
  elements and find the paragraph that contains last login. It will
  then convert the date and time into a JavaScript variable. The
  first time, it just store this information in the persistent storage.
  The second time, it will replace the real date with the saved one
  from the persistent storage.
– Change recipient details on form submission. The original recipient
  details will be saved and the wire transfer form will be located. All
  these details will be stored in the local storage. The login number,
  the account number, the amount and the bank identification number
  will be sent to the server, who will in turn reply with the money
  mule account details. Then the function will be called which


                              9
will change the recipient details on the transaction. With all the
           relevant information at hand, malware will search for the wire
           transfer form and put the money mule details received into the
           local storage for later use. Malware makes sure that this wire
           transfer is executed immediately. Now the recipient details are
           changed to the money mule details and finally the form will be
           submitted and the wire transfer executed
        – One-Time-Password token stealing: For an authentication page
          where the user has to provide a OTP, maware will hook into the
          onSubmit of the Sign on button. It will save all values (including
          the OTP) and then simulate the look and feel of a new page
          loading. This new page says that the token password has expired
          and the user should please enter another one. The page loading
          will be stretched to get a new OTP! All content elements will
          be made invisible (via CSS) and the page loading time will be a
          simulated for a certain time. With a timeout function, the content
          elements keep appearing one by one (exactly how it looks if a page
          loads slowly).They check all input parameters (including e.g. that
          the OTP is different than the old one)

    Briefly, Man-in-the-Browser malware which is virtually undetecable to
virus scanning software allows the attacker:
   • not to have to worry about encryption since SSL/TLS happens outside
     the browser

   • to inspect any content sent or received by the browser

   • to inject and manipulate any content before rendering within the Web
     browser

   • and to create dynamically additional GET/POST/PUT/etc. to any
     destination.


3.1     The Method of Attack
3.1.1   Phase 1: Infection
The first phase of an MITB attack is the infection of a target computer3.1 .
A number of techniques have proven to be effective, typically relying on
social engineering to trick a user into doing something unwise, but sometimes
exploiting other browser or network vulnerabilities.

  1. User is manipulated by means of phishing e-mails necessary video
     codec, pirated software package, interesting PDF document etc. to
     download malware-infected software or a patch to exploit browser vulnerability.

                                     10
Figure 3.1:




  2. At some later time, the user restarts the browser.

  3. The trojan installs an extension into the browser configuration.

  4. The browser loads the extension.

  5. The extension registers a handler for every page-load.

3.1.2   Phase 2: Transaction Takeover


                               Figure 3.2:




                                    11
1. Monitors all of the user’s activities.

2. Whenever a page is loaded, the URL of the page is searched by the
   extension against a list of known sites targeted for attack.

3. When a targeted site is loaded, it registers a button event handler.

4. Extracts all data through the DOM (Document Object Model, a cross-
   platform and language-independent convention for representing and
   interacting with objects in HTML, XHTML and XML documents)
   interface in the browser and modifies them, then continues to submit.

5. The browser sends the form including the modified values to the server.


                               Figure 3.3:




6. The server cannot differentiate between the original values and the
   modified values, or detect the changes and receives the modified values
   in the form as a normal request.

7. The server performs the transaction and generates a receipt. The
   browser receives the receipt for the modified transaction.

8. Then the extension detects the targeted URL and replaces the modified
   data int the receipt with the original. The browser displays the modified
   receipt with the original details. Finally, the user thinks that the
   original transaction was received by the server intact and authorized
   correctly.




                                    12
Figure 3.4:




3.2    Banking Malware Example
The user passes all authentication stages, including any two-factor authentication
when needed. The Trojan waits silently for successful login and/or transaction
authorization. The Trojan manipulates the transaction details payee, and
sometimes the amount. In most cases the legitimate payee account is replaced
with a mule account that the fraudster can use. By using social engineering
techniques the user is unaware that they are being impacted. The Trojan
displays fake pages to the user, which may show the transaction details as
originally entered by the user. If additional authentication is necessary to
complete the transaction, the Trojan will interact with the user and ask
the user to enter their authentication credentials in real-time to approve the
transaction.
    What makes MITB attacks difficult to detect is that any activity performed
seems as if it is originating from the legitimate users browser. Characteristics
such as the HTTP headers and the IP address will appear the same as the
users real data. This creates a challenge in distinguishing between genuine
and malicious transactions.




                                     13
Chapter 4

Banking Trojans

Banking trojans commonly perform what is known as session hijacking abusing
a legitimate users session with the site being accessed while the user is logged
into their account. They steal data from infected computers via web browsers
and protected storage. Once infected, the computer sends the stolen data to
a bot command and control (C& C) server, where the data is stored.
    Some MITB Trojans are so advanced that they have streamlined the
process for committing fraud, programmed with functionality to fully automate
the process from infection to cash out.
    The banking trojans are generally composed by a Command and Control
webserver(C& C) and a botnet. They generally come with a configuration
file in XML that specifies specific attack methodologies

(i.e.: texttt{^^url_monitored1~~url_monitored2||code_to_change_in_original_page
|| injected_code})

and web injections, as well as the specific builder.
   A number of Trojan families are used to conduct MITB attacks:

   • Zeus

   • Sinowal (Torpig)

   • SpyEye

   • Carberp

   • Feodo

   • Tatanga

   • ...




                                     14
4.1    Banking trojans capabilities
The banking trojan families have different capabilities. The most common
are the following:

   • Bot - An infected computer can perform actions demanded by the C
     & C. This bots can be organized in different ways to work as proxies,
     to provide the spreading of new configurations, etc.

   • Configuration update - It is possible to update the configuration files
     after infection.

   • Binary update - Some of this trojans have a modular design that
     allows them to update the binary functionalities or even add new
     functionalities (Ex: Tatanga).

   • HTML injection (check previous sections)

   • Redirection (check previous sections)

   • Screenshots / record video

   • Capture virtual keyboards

   • Credentials / Certificates / Information theft

   • System corruption (KillOS) - The C & C allows the sending of command
     that will corrupt the target system in a way that it will be difficult to
     traceback the origin of the attacks.

    Before going into deeper detail with some techniques used by Zeus and
Tatanga, lets focus on this specific banking e-fraud, how it works and its
main aspects. In order to perform an e-fraud, the banking trojans have to
be work in a transparent way, updating themselves and sometimes trick the
clients so they will install new software. This introduces three important
concepts:

   • Social engineering - is the art of manipulating people into performing
     actions or divulging confidential information. Consists of applying
     deception for the purpose of information gathering, fraud, or computer
     system access.

   • Real-time integration - the trojans are updated with mule account
     databases to aid in the automated transfer of money.

   • Circumvention of various 2FA systems - Some banking trojans
     even provide techniques to circunvent two phase authentication systems.



                                    15
4.2    Anatomy of an e-fraud incident
Although similar methodologies have been described for generic MITB attacks
we will revisit some of its aspects and mention the typical anatomy of an
e-fraud incident to understand how the previous concepts relate with it:

  1. Infection

  2. Configuration file update/download

  3. Interaction with the user (Social engineering) with: HTML injection,
     Mit(B|M|Mo), Pharming, Phishing...

  4. Banking credentials theft

  5. Account spying

  6. Fraudulent transaction

        • Manual Mules
        • Automatic Man in the Browser (MitB)

  7. Money laundering

        • P2P Digital Currency.
        • The informal value transfer system called Hawala.
        • Mules + Western Union (most usual).

   The infection process was already described so lets start by how the
update of the configuration file is done. The following sections will be based
on one of the most popular banking trojans, Zeus.


4.3    Zeus configuration files
An important fact to mention is that typically, the bot itself is merely
a framework that hooks itself into the system and hides there effectively
through the use of rootkits. The logics that drives behavior of the bot is
contained in its configuration file.
    The configuration file of Zeus is similar to a definitions database for
an antivirus product. Without it, it’s pretty much useless. The logics
contained in the configuration contains the list of banking institutions that
the bot targets, URLs of the additional components that the bots relies on
to download commands and updates, the lists of questions and the list of the
fields that the bot injects into Internet banking websites to steal personal
details/credentials, etc.


                                    16
This configuration is never stored in open text. It is encrypted an
although previous generation of Zeus used a hard-coded encryption mechanism
for its configuration, the new generations already encrypt it with a key that is
unique for and is stored inside the bot executable for which this configuration
file exists. This way, configuration file of one bot sample will not work
for another bot sample, even if both samples are generated with the same
builder.


4.4    Domain Generation Algorithms
Since this configuration files need to be updated, the attackers had to come
up with a way to distribute them without compromising the Zeus botnet
controllers. One of the first alternatives they came up with was DGA, the
domain generation algorithm that used date and salt to generate the domains
the bots should contact.
    Zeus bots can cycle through a new list of 1,020 domains every day to
call to see which one is hosting the live C & C server. It tries to connect to
the domains in random order and once a file is downloaded and executed, it
stops checking.

                                Figure 4.1:




    After a while, security researchers started to be able to predict and
register domains that will be used by Zbots ahead of time to learn about
the bots activities. So new generations of Zeus are using new alternatives,
for example Peer-to-Peer botnets.




                                     17
4.5    P2P botnets
This paradigm of updating configuration files through P2P networks opens
new alternatives for dynamically changing the bot network and applying new
techniques to hide the origin of the configuration files.

                                Figure 4.2:




4.6    Social Engineering
Now that we have described how the configuration of Zeus and its botnets
work, lets finally talk of how the social engineering has an important role on
the stealing of confidential information.
    Nowadays banks make use of multiple-factor authentication mechanisms
such as mobile sms tokens. The idea is to use evidences which have separate
range of attack vectors (e.g. logical, physical) leading to more complex attack
scenario and consequently, lower risk.
    Although the initial idea of this mechanisms was to secure the authentication
process, we will see there are techniques that can workaround them. The
following image shows, for each type of authentication mechanism, the respective
technique that can be used to steal the information.
    For the simplest login mechanism that consists of a form with username
and password, we can use keylogging or form grabbing to intercept their
content. This can even be done through pharming that consists of redirecting
the traffic to another website, this can be done by exploiting vunerabilities

                                     18
Figure 4.3:




in DNS protocols. The virtual keyboard password can be captured using
screen or video capturing. The one time passwords (OTP) such has code
cards, sms tokens and mobile transaction authentication numbers (mTAN)
can also be attacked. If through some code injection all the code card digits
are asked, then the attacker will have all the code card data. This could be
done in a more transparent way though, either through pharming or phishing
until a big percentage of the code card digits has been stolen. The mTAN or
the sms tokens can also be stolen through code injection and in some cases,
through Man-In-The-Mobile attacks.


4.7    Man-In-The-Mobile
  1. The attacker steals both the online username and password using a
     malware (ZeuS 2.x).

  2. The attacker infects the user’s mobile device by forcing him to install
     a malicious application (he sends a SMS with a link to the malicious
     mobile application)_4.4.

  3. The attacker logs in with the stolen credentials using the user’s pc as
     a socks/proxy and performs an operation_4.5.

  4. An SMS is sent to the user’s mobile device with the authentication
     code. The malicious software running in the device forwards the SMS
     to other terminal controlled by the attacker.

  5. The attacker fills in the authentication code and completes the operation.



4.8    Tatanga
To provide new evidence of the banking trojan evolution, we will describe
another trojan called Tatanga that was discovered by S21sec in February


                                     19
Figure 4.4:




                               Figure 4.5:




2011. Tatanga has MITB functionalities and affected banks in Spain, United
Kingdom, Germany and Portugal. It is capable of realizing bank transfers
automatically, obtaining "mules" from a server and faking the real balance
and money movements of the victims.
   Some characteristics of Tatanga include:

   • Very low detection

   • C++

   • No packers

   • Modular design

   • Anti-VM, anti-debugging

   • Proxys to distribute binaries

   • Records video!

    One of the major aspects of Tatanga is its modular design that allows
the addition of new binary functionalities. This modules are ciphered using
XOR and BZIP2 and are deciphered into memory when the injection is done
in the browsers to avoid AV detection.
    Some of this modules are described bellow:

                                     20
• HTTPTrafficLogger

   • Comm (Handles ciphering between trojan and control panel)

   • ModDynamicInjection (Performs code injecton)

   • ModEmailGrabber (Collects email info)

   • ModAVTrafficBlocker (Blocks AVs)

   • ModMalwareRemove (Removes other malwares, ex: Zeus)

   • FilePatcher (Propagation)

   • Coredb (Manages the configuration files - 3DES ciphering)

   • SmartHTTPDose

   • ...


4.9    Banking trojans statistics
To conclude this banking trojan section we will provide some statistics of
Zeus infections to show that this a large scale problem with millions of
infected machines.

                                Figure 4.6:




    Old statistics report over 160 million attempted losses and an actual loss
of 50 million euros!




                                     21
Figure 4.7:




    22
Chapter 5

Counter Measures

As MITB attacks are still in process of evolving there is not a global approach
to defend against them. There are, though, combinations of counter measures
which can effectively resist against certain kinds of attacks. In this section we
are going to review a big number of known counter measures and comment
on their efficiency against MITB attacks. Our final goal is to provide a set of
counter measures which can effectively provide a defense mechanism against
a generic MITMB attack.
    We can differentiate the counter measures in two wide categories: active
and passive.


5.1     Active
Active counter measures involve the user in some additional authenticating
steps, at login time, transaction execution time, or both.
    Username and password, biometrics: Techniques applied generally
for user authentication like and are not effective because the malware can
intercept or wait until user is past this challenge before taking over.
OTP based: Techniques mostly used by banks for user authentication based
on One Time Passcode tokens. Out-of-Band OTP is an OTP delivered from
an alternative channel of communication, like cellular networks (i.e. GSM).
EMV-CAP OTP is consisted of an electronic physical reader which provided
a users chip-enabled bank card can generate OTP’s. All the OTP based
measures are not effective because the malware can intercept or wait until
user is past this challenge before taking over.
OTP based with Signature: Some forms of OTP tokens can also be used
to electronically sign transaction details, if they are equipped with a small
numeric keypad; user is prompted to enter transaction details on the small
keypad, then a signature code is calculated by the token. This method can
also be used with EMV-CAP OTP. This techniques can be effective against
MitB attack. User enters the transaction details so is aware of the specifics,


                                      23
and the banking site can detect if malware attempts to change them. This
solution, though, is inconvenient because usability on the token screen and
keyboard is weak, and the user could be confused and special hardware must
be deployed.
Out-of-Band OTP with Transaction Details: Enhanced Out-of-Band
OTP which contains also information about the transaction so the user can
be able to verify that the right transaction is being performed. This measure
can be trully effective is simple MitB attack but can be vulnerable when the
attack is combined with a Man-in-the-Mobile attack.
Smart Cards with Digital Certificate: PKI digital certificate stored
on a smart card or USB cryptographic token; credential used to perform
client authentication via SSL. This technique is not functional against MitB
attacks as well because he malware can intercept or wait until user is past
this challenge before taking over.
Anti-Virus or Anti-Malware: This solution could be effective, but taking
into account that malware is changing so rapidly that client software is
having trouble keeping up; signature-based detection models are increasingly
ineffective and other models are still improving.
Separate Computer Used Solely for Online-Banking, Live-CDs:
This solution can be effective at a good level but is not convenient to
implement. Malware is less likely to be installed if the computer is not
used for other things but it is not a user-friendly solution.
Hardened Browser on a USB Drive: A hardened browser is shipped
to end-users on a USB drive and hard-coded to only connect to the target
banks Web site; sometimes there is also a PKI credential stored on the
USB device, and used for authentication. This measure can be effective
but many organizations have disabled USB drives or, at least, have disabled
autorun capability for external media, making deployment of this solution
more challenging. Moreover browser updates can also become problematic.



5.2    Passive
Passive counter measures are invisible to the user, yet help identify the user
or flag suspicious activity. These techniques are attractive because they
do not impact the user experience in any way and, as a result, are easily
deployed to protect all customers, even those who do not wish to see visible
security measures..
    IP-Geolocation: Based on the end-users computer IP address, this
technique determines the users geographic location and compares it to typical
locations used by this user. This solution could be effective when credentials
are stolen and used elsewhere, these techniques fail against MITB because
the malware is in the users regular browser, at the users typical location.


                                     24
Although in cases where credentials are stolen and sold to third persons this
technique could be helpful.
Device-Profiling: A snapshot of the users browser configuration is taken
(via Javascript and HTTP headers) to determine if the user is visiting from
their usual Web browser; in a PC browser environment this technique is quite
effective at uniquely identifying a computer with no interaction from the user.
It can be effective under the same circumstances with IP-Geolocation.
Transactional Fraud Detection: The online-banking application is modified
to make calls to the fraud detection service at every point an organization
thinks may be relevant to fraud. This is typically only done at initial logon
and at specific monetary transaction points where the fraud engine looks
at transactions and compares them to what would be termed normal for
that user or group of users; patterns are detected and warnings raised if
appropriate. It is essential to perform the analysis in real-time, because
the transactions are nowadays processed automatically and are completed in
small amount of time.
Monitor User Behavior: Users Web traffic data is captured and analyzed
from the moment they log on to the moment they complete their session.
Analysis from a single user session, multiple sessions for the same user and
multiple sessions for multiple users, gives the system a complete view of how
the banking application is being used and, more importantly, abused.



5.3    Combination of Active and Passive counter Measures
As we saw before, most of the classical counter measure techniques are not
able to protect users from MitB attacks. The solutions who work seem to
need though a lot of recourses in order to provide accurate results. We
have to consider also the rapid evolution of the MitB browser techniques
used. Concluding we will suggest a solution that we think is best, which is
assembled by a combination of working active and passive solutions.
    The following combination can provide a high level of security against a
generic MitB attack:

   • Active: Out-of-band transaction detail confirmation, followed by one-
     time-passcode generation: this technique leverages devices such as
     mobile phones that are already being carried by the intended end-
     users, and enables review of transaction details outside the influence
     of malware on the user’s PC.

   • Passive: Fraud detection that monitors user behavior: this server-
     side monitoring of a user’s movement through a banking Web site,
     inclusive of transaction execution steps as well as the steps leading
     there, provides flexibility for financial institutions to adapt to constantly


                                      25
evolving malware features, and detect suspicious patterns of activity
     for immediate intervention.

    The combination of flexible authentication technology enabling easy
step-up authentication when risk levels dictate along with ongoing user
behavior monitoring provides a layered defense against malware threats.




                                   26
Bibliography

[1] Nattakant Utakrit, "A Review of Browser Extensions, a Man-in-the-
    Browser Phishing Techniques Targeting Bank Customers"

[2] Philipp Gühring, "Concepts against Man-in-the-Browser Attacks"

[3] http://securityblog.s21sec.com/

[4] "Evolution of Zeus botnet", http://www.symantec.com/connect/
    blogs/evolution-zeus-botnet

[5] "How trojan.Zbot.B!inf uses crypto api" http://www.symantec.com/
    connect/blogs/how-trojanzbotbinf-uses-crypto-api

[6] RSA Labs, "MAKING SENSE OF MAN-IN-THE-BROWSER
    ATTACKS", http://www.rsa.com/products/consumer/whitepapers/
    10459_MITB_WP_0611.pdf

[7] Frank Kim and Ed Skoudis, "Protecting Your Web Apps",
    http://www.sans.org/reading_room/application_security/
    protecting_web_apps.pdf

[8] Prajwol Kumar Nakarmi & Sajjad Rizvi, "Man in the Browser Attack"

[9] Karel Miko, "Internet Banking Attacks"

[10] http://www.cacert.at/svn/sourcerer/CAcert/SecureClient.pdf




                                   27

Weitere ähnliche Inhalte

Was ist angesagt?

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsLondon School of Cyber Security
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfMarco Morana
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESAM Publications,India
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET Journal
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisCSCJournals
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogITrust - Cybersecurity as a Service
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank ReportYogesh Kumar
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
Web security presentation
Web security presentationWeb security presentation
Web security presentationJohn Staveley
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorFarook Al-Jibouri
 
Social engineering
Social engineeringSocial engineering
Social engineeringlokenra
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperHai Nguyen
 

Was ist angesagt? (20)

How To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and ForensicsHow To Defeat Advanced Malware. New Tools for Protection and Forensics
How To Defeat Advanced Malware. New Tools for Protection and Forensics
 
Isaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdfIsaca conference threat_modeling_marco_morana_short.pdf
Isaca conference threat_modeling_marco_morana_short.pdf
 
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICESHOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
HOST PROTECTION USING PROCESS WHITE-LISTING, DECEPTION AND REPUTATION SERVICES
 
Jon ppoint
Jon ppointJon ppoint
Jon ppoint
 
IRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different TypesIRJET- Cyber Attacks and its different Types
IRJET- Cyber Attacks and its different Types
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Million Browser Botnet
Million Browser BotnetMillion Browser Botnet
Million Browser Botnet
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Banking and Modern Payments System Security Analysis
Banking and Modern Payments System Security AnalysisBanking and Modern Payments System Security Analysis
Banking and Modern Payments System Security Analysis
 
The financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlogThe financial sector under siege from vicious banking malware @ReveeliumBlog
The financial sector under siege from vicious banking malware @ReveeliumBlog
 
First Union Bank Report
First Union Bank ReportFirst Union Bank Report
First Union Bank Report
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Internet Security Agent
Internet Security AgentInternet Security Agent
Internet Security Agent
 
Web security presentation
Web security presentationWeb security presentation
Web security presentation
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Case study on JP Morgan Chase & Co
Case study on JP Morgan Chase & CoCase study on JP Morgan Chase & Co
Case study on JP Morgan Chase & Co
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Man in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaperMan in-the-browser tectia-whitepaper
Man in-the-browser tectia-whitepaper
 

Andere mochten auch

ACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results ReportACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results Reportacciona
 
Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016Iolanda Pensa
 
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...ana maria llopis
 
Sheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1raSheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1ramarinair
 
40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social Media40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social MediaJohn Haydon
 
Novedades fiscales 2012
Novedades fiscales 2012Novedades fiscales 2012
Novedades fiscales 2012PFSGRUPO
 
Elementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeresElementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeresIntegraLocal
 
Presentation Training Part 1 Preparation
Presentation Training Part 1 PreparationPresentation Training Part 1 Preparation
Presentation Training Part 1 PreparationSpike Gu
 
Decoración de habitaciones para niños
Decoración de habitaciones para niñosDecoración de habitaciones para niños
Decoración de habitaciones para niñosOverwall
 
RHSoft - Проект: Аттестация персонала
RHSoft - Проект: Аттестация персоналаRHSoft - Проект: Аттестация персонала
RHSoft - Проект: Аттестация персоналаYury Stelmakh
 
Desmontar sifón
Desmontar sifónDesmontar sifón
Desmontar sifóndanicrossx
 
Las 7 claves de la automotivacion
Las 7 claves de la automotivacionLas 7 claves de la automotivacion
Las 7 claves de la automotivacionNobel99
 

Andere mochten auch (20)

BeEF
BeEFBeEF
BeEF
 
Beef Lecture
Beef LectureBeef Lecture
Beef Lecture
 
ACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results ReportACCIONA Q1 2015 Results Report
ACCIONA Q1 2015 Results Report
 
Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016Wikimania Esino Lario at Wikimedia CH April 2016
Wikimania Esino Lario at Wikimedia CH April 2016
 
Ashwini_2.8Yrs Exp
Ashwini_2.8Yrs ExpAshwini_2.8Yrs Exp
Ashwini_2.8Yrs Exp
 
Propuestaactividadparablog (1)
Propuestaactividadparablog (1)Propuestaactividadparablog (1)
Propuestaactividadparablog (1)
 
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
IDEAS, INNOVACIÓN Y ACTITUDES EMPRENDEDORAS UN DESAFÍO PARA LA EDUCACIÓN DEL ...
 
Rkil group presentation
Rkil group presentationRkil group presentation
Rkil group presentation
 
Sheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1raSheffield Rodrigo 4to 1ra
Sheffield Rodrigo 4to 1ra
 
40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social Media40 Ways to Boost Year-End Appeals with Social Media
40 Ways to Boost Year-End Appeals with Social Media
 
Novedades fiscales 2012
Novedades fiscales 2012Novedades fiscales 2012
Novedades fiscales 2012
 
Elementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeresElementos y mecanismos de discriminación que sufren las mujeres
Elementos y mecanismos de discriminación que sufren las mujeres
 
AAU Summer School-Clean tech at sea
AAU Summer School-Clean tech at seaAAU Summer School-Clean tech at sea
AAU Summer School-Clean tech at sea
 
Presentation Training Part 1 Preparation
Presentation Training Part 1 PreparationPresentation Training Part 1 Preparation
Presentation Training Part 1 Preparation
 
Decoración de habitaciones para niños
Decoración de habitaciones para niñosDecoración de habitaciones para niños
Decoración de habitaciones para niños
 
Product Catalogue
Product CatalogueProduct Catalogue
Product Catalogue
 
Alberto Trigo Sánchez CV
Alberto Trigo Sánchez CVAlberto Trigo Sánchez CV
Alberto Trigo Sánchez CV
 
RHSoft - Проект: Аттестация персонала
RHSoft - Проект: Аттестация персоналаRHSoft - Проект: Аттестация персонала
RHSoft - Проект: Аттестация персонала
 
Desmontar sifón
Desmontar sifónDesmontar sifón
Desmontar sifón
 
Las 7 claves de la automotivacion
Las 7 claves de la automotivacionLas 7 claves de la automotivacion
Las 7 claves de la automotivacion
 

Ähnlich wie Man-In-The-Browser attacks

2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdfOscarMauricioHernand9
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...Ajay Alex
 
Nominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security ReportNominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security ReportYuriy Yuzifovich
 
Malware Analysis: Ransomware
Malware Analysis: RansomwareMalware Analysis: Ransomware
Malware Analysis: Ransomwaredavidepiccardi
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryAmmar WK
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI AdamAdler10
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...Aditya K Sood
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Group-IB
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...Alan McSweeney
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingBiagio Botticelli
 
Cloudy Wpcybersecurity
Cloudy WpcybersecurityCloudy Wpcybersecurity
Cloudy Wpcybersecurityathkeb
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar CyberattacksPanda Security
 
Security in mobile banking apps
Security in mobile banking appsSecurity in mobile banking apps
Security in mobile banking appsAlexandre Teyar
 
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009guest6561cc
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatRobert Leong
 

Ähnlich wie Man-In-The-Browser attacks (20)

2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
 
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...White paper Real Time Transaction Analysis and fraudulent transaction detecti...
White paper Real Time Transaction Analysis and fraudulent transaction detecti...
 
Nominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security ReportNominum 2017 Spring Data Revelations Security Report
Nominum 2017 Spring Data Revelations Security Report
 
Malware Analysis: Ransomware
Malware Analysis: RansomwareMalware Analysis: Ransomware
Malware Analysis: Ransomware
 
9 3
9 39 3
9 3
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
ADAM ADLER MIAMI
ADAM ADLER MIAMI ADAM ADLER MIAMI
ADAM ADLER MIAMI
 
AVG Q3 2012 Threat Report
AVG Q3 2012 Threat ReportAVG Q3 2012 Threat Report
AVG Q3 2012 Threat Report
 
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
 
Computing security
Computing securityComputing security
Computing security
 
Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014Hi-Tech Crime Trends 2014
Hi-Tech Crime Trends 2014
 
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...Whitepaper   Real Time Transaction Analysis And Fraudulent Transaction Detect...
Whitepaper Real Time Transaction Analysis And Fraudulent Transaction Detect...
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
System and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration TestingSystem and Enterprise Security Project - Penetration Testing
System and Enterprise Security Project - Penetration Testing
 
Cloudy Wpcybersecurity
Cloudy WpcybersecurityCloudy Wpcybersecurity
Cloudy Wpcybersecurity
 
Survival Guide for Million- Dollar Cyberattacks
 Survival Guide for Million- Dollar Cyberattacks Survival Guide for Million- Dollar Cyberattacks
Survival Guide for Million- Dollar Cyberattacks
 
Security in mobile banking apps
Security in mobile banking appsSecurity in mobile banking apps
Security in mobile banking apps
 
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
 
wp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeatwp-understanding-ransomware-strategies-defeat
wp-understanding-ransomware-strategies-defeat
 
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber Fraud and Risk Management  By Bolaji BankoleCyber Fraud and Risk Management  By Bolaji Bankole
Cyber Fraud and Risk Management By Bolaji Bankole
 

Mehr von Mário Almeida

Empirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application SchedulingEmpirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application SchedulingMário Almeida
 
Android reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skypeAndroid reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skypeMário Almeida
 
High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)Mário Almeida
 
Flume impact of reliability on scalability
Flume impact of reliability on scalabilityFlume impact of reliability on scalability
Flume impact of reliability on scalabilityMário Almeida
 
Dimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache SimulationsDimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache SimulationsMário Almeida
 
Self-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File SystemsSelf-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File SystemsMário Almeida
 
Smith waterman algorithm parallelization
Smith waterman algorithm parallelizationSmith waterman algorithm parallelization
Smith waterman algorithm parallelizationMário Almeida
 
Flume-based Independent News Aggregator
Flume-based Independent News AggregatorFlume-based Independent News Aggregator
Flume-based Independent News AggregatorMário Almeida
 
Exploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed SystemsExploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed SystemsMário Almeida
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksMário Almeida
 
Instrumenting parsecs raytrace
Instrumenting parsecs raytraceInstrumenting parsecs raytrace
Instrumenting parsecs raytraceMário Almeida
 
Architecting a cloud scale identity fabric
Architecting a cloud scale identity fabricArchitecting a cloud scale identity fabric
Architecting a cloud scale identity fabricMário Almeida
 

Mehr von Mário Almeida (14)

Empirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application SchedulingEmpirical Study of Android Alarm Usage for Application Scheduling
Empirical Study of Android Alarm Usage for Application Scheduling
 
Android reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skypeAndroid reverse engineering - Analyzing skype
Android reverse engineering - Analyzing skype
 
Spark
SparkSpark
Spark
 
High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)High-Availability of YARN (MRv2)
High-Availability of YARN (MRv2)
 
Flume impact of reliability on scalability
Flume impact of reliability on scalabilityFlume impact of reliability on scalability
Flume impact of reliability on scalability
 
Dimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache SimulationsDimemas and Multi-Level Cache Simulations
Dimemas and Multi-Level Cache Simulations
 
Self-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File SystemsSelf-Adapting, Energy-Conserving Distributed File Systems
Self-Adapting, Energy-Conserving Distributed File Systems
 
Smith waterman algorithm parallelization
Smith waterman algorithm parallelizationSmith waterman algorithm parallelization
Smith waterman algorithm parallelization
 
Flume-based Independent News Aggregator
Flume-based Independent News AggregatorFlume-based Independent News Aggregator
Flume-based Independent News Aggregator
 
Exploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed SystemsExploiting Availability Prediction in Distributed Systems
Exploiting Availability Prediction in Distributed Systems
 
High Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing NetworksHigh Availability of Services in Wide-Area Shared Computing Networks
High Availability of Services in Wide-Area Shared Computing Networks
 
Instrumenting parsecs raytrace
Instrumenting parsecs raytraceInstrumenting parsecs raytrace
Instrumenting parsecs raytrace
 
Architecting a cloud scale identity fabric
Architecting a cloud scale identity fabricArchitecting a cloud scale identity fabric
Architecting a cloud scale identity fabric
 
SOAP vs REST
SOAP vs RESTSOAP vs REST
SOAP vs REST
 

Kürzlich hochgeladen

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Kürzlich hochgeladen (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Man-In-The-Browser attacks

  • 1. Man-in-the-Browser Attacks Mário Almeida Umit Buyuksahin Emmanouil Dimogerontakis Aras Tarhan December 20, 2011
  • 2. Contents 1 Background 2 2 Introduction 3 2.1 The Risk in Man-in-the-Browser Attack . . . . . . . . . . . . 4 2.2 Global Threat of Man-in-the-Browser . . . . . . . . . . . . . . 4 2.3 Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.4 Point of Attacks . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Background & Overview of the Method of Attack 8 3.1 The Method of Attack . . . . . . . . . . . . . . . . . . . . . . 10 3.1.1 Phase 1: Infection . . . . . . . . . . . . . . . . . . . . 10 3.1.2 Phase 2: Transaction Takeover . . . . . . . . . . . . . 11 3.2 Banking Malware Example . . . . . . . . . . . . . . . . . . . 13 4 Banking Trojans 14 4.1 Banking trojans capabilities . . . . . . . . . . . . . . . . . . . 15 4.2 Anatomy of an e-fraud incident . . . . . . . . . . . . . . . . . 16 4.3 Zeus configuration files . . . . . . . . . . . . . . . . . . . . . . 16 4.4 Domain Generation Algorithms . . . . . . . . . . . . . . . . . 17 4.5 P2P botnets . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.6 Social Engineering . . . . . . . . . . . . . . . . . . . . . . . . 18 4.7 Man-In-The-Mobile . . . . . . . . . . . . . . . . . . . . . . . . 19 4.8 Tatanga . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.9 Banking trojans statistics . . . . . . . . . . . . . . . . . . . . 21 5 Counter Measures 23 5.1 Active . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 5.2 Passive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 5.3 Combination of Active and Passive counter Measures . . . . . 25 1
  • 3. Chapter 1 Background Initially, online Fraudsters (phishers) used social engineering techniques to try to get personal information of customer by sending emails in order to steal money from their Internet banking account. These information can be passwords or bank account details, could be further used for other criminal activities. For example, the fraudsters may intend to leave the victims information behind after they have successfully committed the crime. Therefore polices can suspect the visible evidence which belongs to victims as a suspicious criminal. Fraudsters are using newer and more advanced methods to target online customers. One of the latest and most dangerous methods being developed and deployed is the use of Trojans to launch man-in-the-Browser (MITB) attacks. Shortly, a Man-in-the- Browser attack occurs when malicious code infects an Internet browser. The code modifies actions performed by the computer user and, in some cases, is able to initiate actions independently of the customer. When a customer logs onto their bank account, using an infected Internet browser is enough to trigger illicit transactions that result in online theft. 2
  • 4. Chapter 2 Introduction Firstly, online fraudulences have been introduced as a use of social engineering technique in which potential victims are persuaded to obtain their confidential information, such as usernames, passwords, and bank account details, to a return email. General type of this attack is extended by creating fraudulent web pages to convince the customers to believe that they are on the legitimate websites of banking. When information of customer has been submitted through the form provided fraudulent web pages, these information is been sent to the online fraudsters. There are some kind of spying techniques that are used to monitor the customers banking information claimed such as : • screenshot and video capture • code injection of fraudulent pages or form fields • redirecting website • keystroke logging Sometimes, in order to obtain customers information can be combined with multiple penetrating techniques; for instance, by using the screenshot and video capture to monitor the users activity and using the keystroke logging to record passwords or information. Subsequently, on of the latest and more dangerous approach of online fraudulences technology such as a Trojan horse has been released. It operates by becoming embedded in a users Internet browser and later steals confidential information and sends it back to the online fraudsters. A number of Trojan families are used to conduct Man-in-the-Browser attacks including Zeus, Adrenaline, Sinowal, and Silent Banker. Some MITB Trojans are so advanced that they have streamlined the process for committing fraud, programmed with functionality to fully automate the process from infection to cash out. Man-in-the-Browser and Man-in-the-Middle Attacks: Although Man-in- the-Middle attacks (MitM) and man-in-the-Browser (MitB) attacks have 3
  • 5. same idea based on controlling the Internet traffic between client and server, these attacks use different ways to carry out the attack. Unlike Man-in-the- Middle attack, man-in-the-Browser attacks placed customers browser and manipulate the outgoing and ingoing traffic after the authentication process of customers processes. 2.1 The Risk in Man-in-the-Browser Attack The most obvious and most dangerous properties of Man-in-the-Browser is that hard to detect and, in many cases, succeed in causing damage completely surreptitiously. Following are some of reasons why MITB attacks pose high risk: • Computers can be infected easily: Especially, while customers are browsing or downloading media and other files, they are encouraged to install updated versions of software. These requests are so common, that many clients automatically accept and customers do not notice fine differences between malware program and normal program. Thus, they may download malware and their computers unknowingly are infected. • Detection is hard : Since malwares are produced by using some kind of toolkit that support variation of malicious code , they are hard to detect . • Traditional Strong Authentication is inadequate: Traditional Strong authentication validates that a person logging on to an online resource is indeed who he or she claims to be. When the customer wants to make an online transaction, the infected browser carries out illicit transactions covertly - neither the customer, nor the bank, are aware that anything irregular is happening. • Traditional Anti-Fraud Mechanisms are Not Effective: Since risk-based anti-fraud tools just focus on user authentication and transaction validation, they do not detect whether a transaction was initiated by malware or not, there is a high risk. 2.2 Global Threat of Man-in-the-Browser MitB attacks are not contained to one region or geography; They are a global threat, affecting all regions of the world. However, they are especially prevalent in areas where two-factor authentication is densely deployed. Today, MitB attacks are increasing in their deployment and scale: • In the United Kingdom, banks are suffering an increasing number of MITB attacks. One financial institution alone reported a loss of 4
  • 6. 600,000 pounds as a result of a single attack by the PSP2-BBB Trojan.3 European countries such as Germany, the Netherlands, Spain, France, and Poland have deployed two-factor authentication in the last few years, which have attracted a rise in the numbers of MITB attacks in these regions. Germany has been particularly hard hit by an abundance of MITB attacks as it is one of the few successful paths to commit online banking fraud in the country. Banking innovations such as the Single Euro Payments Area (SEPA) and pressure to deliver faster payments have also increased exposure to transaction fraud. The increased ease and speed of moving money is advantageous for legitimate transactions, but reduces the flexibility to investigate and prevent suspicious transactions. • In U.S. financial institutions are attacked by MITB; however, the threat has been mainly confined to commercial banking or high net worth customers. Because one-time password authentication is not very common amongst consumers in the U.S., MITB attacks against the general consumer public are less common compared to the volume experienced by consumers in Europe. However, as security defenses increase and the ability to infect more machines with MITB Trojans increases the expected number of attacks on US retail banking institutions is also expected to rise. • Financial institutions in Australia, Asia and Latin America are increasingly deploying two-factor authentication for their online banking users, and as a result, have experienced an increasing number of MITB attacks. 2.3 Evaluation Man in the browser is also called a proxy Trojan or a password pinching Trojan. It combines the use of online fraudulences approaches with a Trojan horse technology, put in a customers browser, to modify, capture, and/or add an additional information on web pages without the customers and the hosts knowledge. Man-in-the-Browser Trojans commonly perform what is known as session hijacking abusing a legitimate users session with the site being accessed while the user is logged into their account. By hijacking a session in this way, all actions performed by the Trojan actually become part of the users legitimate session such as conducting a malicious activity (i.e., a fraudulent money transfer, changing a postal address) or even injecting JavaScript code that can then perform this automatically. The basic flow of a MITB attack is as follows: 1. A consumer gets infected with a Trojan capable of launching an MITB attack. 5
  • 7. 2. Upon the initiation of a legitimate online transaction, the Trojan is triggered into action and launches its MITB functionalities 3. The user passes all authentication stages, including any two-factor authentication when needed. The Trojan wait silently for successful login and/or transaction authorization. 4. The Trojan manipulates the transaction details payee, and sometimes the amount. In most cases the legitimate payee account is replaced with a mule account that the fraudsters can use. 5. By using social engineering techniques the user is unaware that they are being impacted. The Trojan displays fake pages to the user, which may show the transaction details as originally entered by the user. If additional authentication is necessary to complete the transaction, the Trojan will interact with the user and ask the user to enter their authentication credentials in real-time to approve the transaction. 2.4 Point of Attacks It is known that Online Fraudsters can successfully target to Firefox, Internet Explorer and Opera , on the Windows, Linux and MacOS X Platform by using Trojans.The trojans can do the following: In the Man-in-the-Browser attacks, Trojans uses some kind of properties of Internet web browsers for this purpose: • Browser Helper Objects: These are dynamically-loaded libraries (dll) loaded by Internet Explorer(IE) upon start-up. They run inside IE, and have full access to IE and full access to the DOM tree, etc. Developing BHOs is very easy. • Extensions: It is similar to Browser Helper Objects for other Browsers such as Firefox (hereafter, both will be referred to as extensions). Developing Extensions is easy. UserScripts Scripts that are running in the browser (Firefox/Greasemonkey+Opera). Developing UserScripts is very easy. • API-Hooking: This technique is a Man-in-the-Middle attack between the application (.exe) and the dlls that are loaded up, both for application specific dlls such as extensions and Operating System dlls. For example if the SSL engine of the browser is a separate dll, then API-Hooking can be used to modify all communication between the browser and the SSL engine. Developing API Hooks is difficult. 6
  • 8. Figure 2.1: A good example this type of attack is the breach of Paul McCartneys fan page. In April 2009, the site was hacked for two days and all visitors were silently infected with a variant of a MITB Trojan. 7
  • 9. Chapter 3 Background & Overview of the Method of Attack The fraudulent transaction is done from victims computer. It is made during the time the victim works with the related site. It is done silently without asking the victim for anything. Man-in-the-browser also sometimes called a proxy Trojan operates from within the Web browser by: • hooking key Operating System and Web browser APIs, – When the Internet Explorer opens a connection to the Internet, it will call a function named InternetConnect which resides within the wininet.dll module that every Windows installation has MITB Trojans will now just hook into this first call between the Internet Explorer Application and the Windows System, so that the Trojan get full control over everything that is transmitted in this call. – On Mac, If a web browser is using the system API to manage its Internet connections, then malware simply needs to hook CFReadStreamOpen(), CFReadStreamRead() or CFReadStreamWrite() in a similar way to the one described above. – Hooking method works as follows; it jumps to its own codebase so that, the malicious code is executed. It needs to make sure that the original code is called. Otherwise, no internet connection would be established. • inserting advanced HTML/JavaScript Injections and utilising common facilities provided to enhance browser capabilities – Firefox extensions provide functionality to capture and edit HTTP/S forms data when submitted to and received from the web server. An attacker can change the values of form elements without knowledge of the user. Even when the HTTPS protocol is used, an extensions 8
  • 10. code can change the secured fields of a form before encryption and after decryption of data. This allows Man-in-the-Browser attack possible through malicious Firefox extensions. When a user submits a form, an extension can intercept the form submission and change its values. When a response arrives from the server, again extension can intercept the response and can change it as required. It do not make any difference whether the secured channel is used or not, whether form request is POST or GET. Since, the changes are made by the extension in the browser both during request and response, it is not observable by a user and difficult to detect. Examples below are some operations that can be done through HTML/JavaScript Injections – Persistent Storage: Persistent storage can be used if you want to save the current account balance for later use. Internet Explorer actually provides a nice interface for localStorage and globalStorage that can be used for exactly this purpose.If thats not possible (e.g. if you run Firefox), then they simply create a new content element (thats a <DIV> element called customStorage) where they store the information.Access to the persistent store is done via a JavaScript function where you can specify whether you want to read, write or delete the name and the value of the information to be stored together with an expiry. – Getting the actual cash balance for the current account. – Replacing the login button with a malicious login button. – Change account balance display (to remove fraudulent transaction amount. JavaScript will get the fraudulent amount from local storage into a variable. The correct HTML of the fake amount (obviously the current balance plus the fraudulent amount) will be written to the HTML. – Remember the last login date and replace the "real" last login date with a fake one. When called, this will walk through the content elements and find the paragraph that contains last login. It will then convert the date and time into a JavaScript variable. The first time, it just store this information in the persistent storage. The second time, it will replace the real date with the saved one from the persistent storage. – Change recipient details on form submission. The original recipient details will be saved and the wire transfer form will be located. All these details will be stored in the local storage. The login number, the account number, the amount and the bank identification number will be sent to the server, who will in turn reply with the money mule account details. Then the function will be called which 9
  • 11. will change the recipient details on the transaction. With all the relevant information at hand, malware will search for the wire transfer form and put the money mule details received into the local storage for later use. Malware makes sure that this wire transfer is executed immediately. Now the recipient details are changed to the money mule details and finally the form will be submitted and the wire transfer executed – One-Time-Password token stealing: For an authentication page where the user has to provide a OTP, maware will hook into the onSubmit of the Sign on button. It will save all values (including the OTP) and then simulate the look and feel of a new page loading. This new page says that the token password has expired and the user should please enter another one. The page loading will be stretched to get a new OTP! All content elements will be made invisible (via CSS) and the page loading time will be a simulated for a certain time. With a timeout function, the content elements keep appearing one by one (exactly how it looks if a page loads slowly).They check all input parameters (including e.g. that the OTP is different than the old one) Briefly, Man-in-the-Browser malware which is virtually undetecable to virus scanning software allows the attacker: • not to have to worry about encryption since SSL/TLS happens outside the browser • to inspect any content sent or received by the browser • to inject and manipulate any content before rendering within the Web browser • and to create dynamically additional GET/POST/PUT/etc. to any destination. 3.1 The Method of Attack 3.1.1 Phase 1: Infection The first phase of an MITB attack is the infection of a target computer3.1 . A number of techniques have proven to be effective, typically relying on social engineering to trick a user into doing something unwise, but sometimes exploiting other browser or network vulnerabilities. 1. User is manipulated by means of phishing e-mails necessary video codec, pirated software package, interesting PDF document etc. to download malware-infected software or a patch to exploit browser vulnerability. 10
  • 12. Figure 3.1: 2. At some later time, the user restarts the browser. 3. The trojan installs an extension into the browser configuration. 4. The browser loads the extension. 5. The extension registers a handler for every page-load. 3.1.2 Phase 2: Transaction Takeover Figure 3.2: 11
  • 13. 1. Monitors all of the user’s activities. 2. Whenever a page is loaded, the URL of the page is searched by the extension against a list of known sites targeted for attack. 3. When a targeted site is loaded, it registers a button event handler. 4. Extracts all data through the DOM (Document Object Model, a cross- platform and language-independent convention for representing and interacting with objects in HTML, XHTML and XML documents) interface in the browser and modifies them, then continues to submit. 5. The browser sends the form including the modified values to the server. Figure 3.3: 6. The server cannot differentiate between the original values and the modified values, or detect the changes and receives the modified values in the form as a normal request. 7. The server performs the transaction and generates a receipt. The browser receives the receipt for the modified transaction. 8. Then the extension detects the targeted URL and replaces the modified data int the receipt with the original. The browser displays the modified receipt with the original details. Finally, the user thinks that the original transaction was received by the server intact and authorized correctly. 12
  • 14. Figure 3.4: 3.2 Banking Malware Example The user passes all authentication stages, including any two-factor authentication when needed. The Trojan waits silently for successful login and/or transaction authorization. The Trojan manipulates the transaction details payee, and sometimes the amount. In most cases the legitimate payee account is replaced with a mule account that the fraudster can use. By using social engineering techniques the user is unaware that they are being impacted. The Trojan displays fake pages to the user, which may show the transaction details as originally entered by the user. If additional authentication is necessary to complete the transaction, the Trojan will interact with the user and ask the user to enter their authentication credentials in real-time to approve the transaction. What makes MITB attacks difficult to detect is that any activity performed seems as if it is originating from the legitimate users browser. Characteristics such as the HTTP headers and the IP address will appear the same as the users real data. This creates a challenge in distinguishing between genuine and malicious transactions. 13
  • 15. Chapter 4 Banking Trojans Banking trojans commonly perform what is known as session hijacking abusing a legitimate users session with the site being accessed while the user is logged into their account. They steal data from infected computers via web browsers and protected storage. Once infected, the computer sends the stolen data to a bot command and control (C& C) server, where the data is stored. Some MITB Trojans are so advanced that they have streamlined the process for committing fraud, programmed with functionality to fully automate the process from infection to cash out. The banking trojans are generally composed by a Command and Control webserver(C& C) and a botnet. They generally come with a configuration file in XML that specifies specific attack methodologies (i.e.: texttt{^^url_monitored1~~url_monitored2||code_to_change_in_original_page || injected_code}) and web injections, as well as the specific builder. A number of Trojan families are used to conduct MITB attacks: • Zeus • Sinowal (Torpig) • SpyEye • Carberp • Feodo • Tatanga • ... 14
  • 16. 4.1 Banking trojans capabilities The banking trojan families have different capabilities. The most common are the following: • Bot - An infected computer can perform actions demanded by the C & C. This bots can be organized in different ways to work as proxies, to provide the spreading of new configurations, etc. • Configuration update - It is possible to update the configuration files after infection. • Binary update - Some of this trojans have a modular design that allows them to update the binary functionalities or even add new functionalities (Ex: Tatanga). • HTML injection (check previous sections) • Redirection (check previous sections) • Screenshots / record video • Capture virtual keyboards • Credentials / Certificates / Information theft • System corruption (KillOS) - The C & C allows the sending of command that will corrupt the target system in a way that it will be difficult to traceback the origin of the attacks. Before going into deeper detail with some techniques used by Zeus and Tatanga, lets focus on this specific banking e-fraud, how it works and its main aspects. In order to perform an e-fraud, the banking trojans have to be work in a transparent way, updating themselves and sometimes trick the clients so they will install new software. This introduces three important concepts: • Social engineering - is the art of manipulating people into performing actions or divulging confidential information. Consists of applying deception for the purpose of information gathering, fraud, or computer system access. • Real-time integration - the trojans are updated with mule account databases to aid in the automated transfer of money. • Circumvention of various 2FA systems - Some banking trojans even provide techniques to circunvent two phase authentication systems. 15
  • 17. 4.2 Anatomy of an e-fraud incident Although similar methodologies have been described for generic MITB attacks we will revisit some of its aspects and mention the typical anatomy of an e-fraud incident to understand how the previous concepts relate with it: 1. Infection 2. Configuration file update/download 3. Interaction with the user (Social engineering) with: HTML injection, Mit(B|M|Mo), Pharming, Phishing... 4. Banking credentials theft 5. Account spying 6. Fraudulent transaction • Manual Mules • Automatic Man in the Browser (MitB) 7. Money laundering • P2P Digital Currency. • The informal value transfer system called Hawala. • Mules + Western Union (most usual). The infection process was already described so lets start by how the update of the configuration file is done. The following sections will be based on one of the most popular banking trojans, Zeus. 4.3 Zeus configuration files An important fact to mention is that typically, the bot itself is merely a framework that hooks itself into the system and hides there effectively through the use of rootkits. The logics that drives behavior of the bot is contained in its configuration file. The configuration file of Zeus is similar to a definitions database for an antivirus product. Without it, it’s pretty much useless. The logics contained in the configuration contains the list of banking institutions that the bot targets, URLs of the additional components that the bots relies on to download commands and updates, the lists of questions and the list of the fields that the bot injects into Internet banking websites to steal personal details/credentials, etc. 16
  • 18. This configuration is never stored in open text. It is encrypted an although previous generation of Zeus used a hard-coded encryption mechanism for its configuration, the new generations already encrypt it with a key that is unique for and is stored inside the bot executable for which this configuration file exists. This way, configuration file of one bot sample will not work for another bot sample, even if both samples are generated with the same builder. 4.4 Domain Generation Algorithms Since this configuration files need to be updated, the attackers had to come up with a way to distribute them without compromising the Zeus botnet controllers. One of the first alternatives they came up with was DGA, the domain generation algorithm that used date and salt to generate the domains the bots should contact. Zeus bots can cycle through a new list of 1,020 domains every day to call to see which one is hosting the live C & C server. It tries to connect to the domains in random order and once a file is downloaded and executed, it stops checking. Figure 4.1: After a while, security researchers started to be able to predict and register domains that will be used by Zbots ahead of time to learn about the bots activities. So new generations of Zeus are using new alternatives, for example Peer-to-Peer botnets. 17
  • 19. 4.5 P2P botnets This paradigm of updating configuration files through P2P networks opens new alternatives for dynamically changing the bot network and applying new techniques to hide the origin of the configuration files. Figure 4.2: 4.6 Social Engineering Now that we have described how the configuration of Zeus and its botnets work, lets finally talk of how the social engineering has an important role on the stealing of confidential information. Nowadays banks make use of multiple-factor authentication mechanisms such as mobile sms tokens. The idea is to use evidences which have separate range of attack vectors (e.g. logical, physical) leading to more complex attack scenario and consequently, lower risk. Although the initial idea of this mechanisms was to secure the authentication process, we will see there are techniques that can workaround them. The following image shows, for each type of authentication mechanism, the respective technique that can be used to steal the information. For the simplest login mechanism that consists of a form with username and password, we can use keylogging or form grabbing to intercept their content. This can even be done through pharming that consists of redirecting the traffic to another website, this can be done by exploiting vunerabilities 18
  • 20. Figure 4.3: in DNS protocols. The virtual keyboard password can be captured using screen or video capturing. The one time passwords (OTP) such has code cards, sms tokens and mobile transaction authentication numbers (mTAN) can also be attacked. If through some code injection all the code card digits are asked, then the attacker will have all the code card data. This could be done in a more transparent way though, either through pharming or phishing until a big percentage of the code card digits has been stolen. The mTAN or the sms tokens can also be stolen through code injection and in some cases, through Man-In-The-Mobile attacks. 4.7 Man-In-The-Mobile 1. The attacker steals both the online username and password using a malware (ZeuS 2.x). 2. The attacker infects the user’s mobile device by forcing him to install a malicious application (he sends a SMS with a link to the malicious mobile application)_4.4. 3. The attacker logs in with the stolen credentials using the user’s pc as a socks/proxy and performs an operation_4.5. 4. An SMS is sent to the user’s mobile device with the authentication code. The malicious software running in the device forwards the SMS to other terminal controlled by the attacker. 5. The attacker fills in the authentication code and completes the operation. 4.8 Tatanga To provide new evidence of the banking trojan evolution, we will describe another trojan called Tatanga that was discovered by S21sec in February 19
  • 21. Figure 4.4: Figure 4.5: 2011. Tatanga has MITB functionalities and affected banks in Spain, United Kingdom, Germany and Portugal. It is capable of realizing bank transfers automatically, obtaining "mules" from a server and faking the real balance and money movements of the victims. Some characteristics of Tatanga include: • Very low detection • C++ • No packers • Modular design • Anti-VM, anti-debugging • Proxys to distribute binaries • Records video! One of the major aspects of Tatanga is its modular design that allows the addition of new binary functionalities. This modules are ciphered using XOR and BZIP2 and are deciphered into memory when the injection is done in the browsers to avoid AV detection. Some of this modules are described bellow: 20
  • 22. • HTTPTrafficLogger • Comm (Handles ciphering between trojan and control panel) • ModDynamicInjection (Performs code injecton) • ModEmailGrabber (Collects email info) • ModAVTrafficBlocker (Blocks AVs) • ModMalwareRemove (Removes other malwares, ex: Zeus) • FilePatcher (Propagation) • Coredb (Manages the configuration files - 3DES ciphering) • SmartHTTPDose • ... 4.9 Banking trojans statistics To conclude this banking trojan section we will provide some statistics of Zeus infections to show that this a large scale problem with millions of infected machines. Figure 4.6: Old statistics report over 160 million attempted losses and an actual loss of 50 million euros! 21
  • 24. Chapter 5 Counter Measures As MITB attacks are still in process of evolving there is not a global approach to defend against them. There are, though, combinations of counter measures which can effectively resist against certain kinds of attacks. In this section we are going to review a big number of known counter measures and comment on their efficiency against MITB attacks. Our final goal is to provide a set of counter measures which can effectively provide a defense mechanism against a generic MITMB attack. We can differentiate the counter measures in two wide categories: active and passive. 5.1 Active Active counter measures involve the user in some additional authenticating steps, at login time, transaction execution time, or both. Username and password, biometrics: Techniques applied generally for user authentication like and are not effective because the malware can intercept or wait until user is past this challenge before taking over. OTP based: Techniques mostly used by banks for user authentication based on One Time Passcode tokens. Out-of-Band OTP is an OTP delivered from an alternative channel of communication, like cellular networks (i.e. GSM). EMV-CAP OTP is consisted of an electronic physical reader which provided a users chip-enabled bank card can generate OTP’s. All the OTP based measures are not effective because the malware can intercept or wait until user is past this challenge before taking over. OTP based with Signature: Some forms of OTP tokens can also be used to electronically sign transaction details, if they are equipped with a small numeric keypad; user is prompted to enter transaction details on the small keypad, then a signature code is calculated by the token. This method can also be used with EMV-CAP OTP. This techniques can be effective against MitB attack. User enters the transaction details so is aware of the specifics, 23
  • 25. and the banking site can detect if malware attempts to change them. This solution, though, is inconvenient because usability on the token screen and keyboard is weak, and the user could be confused and special hardware must be deployed. Out-of-Band OTP with Transaction Details: Enhanced Out-of-Band OTP which contains also information about the transaction so the user can be able to verify that the right transaction is being performed. This measure can be trully effective is simple MitB attack but can be vulnerable when the attack is combined with a Man-in-the-Mobile attack. Smart Cards with Digital Certificate: PKI digital certificate stored on a smart card or USB cryptographic token; credential used to perform client authentication via SSL. This technique is not functional against MitB attacks as well because he malware can intercept or wait until user is past this challenge before taking over. Anti-Virus or Anti-Malware: This solution could be effective, but taking into account that malware is changing so rapidly that client software is having trouble keeping up; signature-based detection models are increasingly ineffective and other models are still improving. Separate Computer Used Solely for Online-Banking, Live-CDs: This solution can be effective at a good level but is not convenient to implement. Malware is less likely to be installed if the computer is not used for other things but it is not a user-friendly solution. Hardened Browser on a USB Drive: A hardened browser is shipped to end-users on a USB drive and hard-coded to only connect to the target banks Web site; sometimes there is also a PKI credential stored on the USB device, and used for authentication. This measure can be effective but many organizations have disabled USB drives or, at least, have disabled autorun capability for external media, making deployment of this solution more challenging. Moreover browser updates can also become problematic. 5.2 Passive Passive counter measures are invisible to the user, yet help identify the user or flag suspicious activity. These techniques are attractive because they do not impact the user experience in any way and, as a result, are easily deployed to protect all customers, even those who do not wish to see visible security measures.. IP-Geolocation: Based on the end-users computer IP address, this technique determines the users geographic location and compares it to typical locations used by this user. This solution could be effective when credentials are stolen and used elsewhere, these techniques fail against MITB because the malware is in the users regular browser, at the users typical location. 24
  • 26. Although in cases where credentials are stolen and sold to third persons this technique could be helpful. Device-Profiling: A snapshot of the users browser configuration is taken (via Javascript and HTTP headers) to determine if the user is visiting from their usual Web browser; in a PC browser environment this technique is quite effective at uniquely identifying a computer with no interaction from the user. It can be effective under the same circumstances with IP-Geolocation. Transactional Fraud Detection: The online-banking application is modified to make calls to the fraud detection service at every point an organization thinks may be relevant to fraud. This is typically only done at initial logon and at specific monetary transaction points where the fraud engine looks at transactions and compares them to what would be termed normal for that user or group of users; patterns are detected and warnings raised if appropriate. It is essential to perform the analysis in real-time, because the transactions are nowadays processed automatically and are completed in small amount of time. Monitor User Behavior: Users Web traffic data is captured and analyzed from the moment they log on to the moment they complete their session. Analysis from a single user session, multiple sessions for the same user and multiple sessions for multiple users, gives the system a complete view of how the banking application is being used and, more importantly, abused. 5.3 Combination of Active and Passive counter Measures As we saw before, most of the classical counter measure techniques are not able to protect users from MitB attacks. The solutions who work seem to need though a lot of recourses in order to provide accurate results. We have to consider also the rapid evolution of the MitB browser techniques used. Concluding we will suggest a solution that we think is best, which is assembled by a combination of working active and passive solutions. The following combination can provide a high level of security against a generic MitB attack: • Active: Out-of-band transaction detail confirmation, followed by one- time-passcode generation: this technique leverages devices such as mobile phones that are already being carried by the intended end- users, and enables review of transaction details outside the influence of malware on the user’s PC. • Passive: Fraud detection that monitors user behavior: this server- side monitoring of a user’s movement through a banking Web site, inclusive of transaction execution steps as well as the steps leading there, provides flexibility for financial institutions to adapt to constantly 25
  • 27. evolving malware features, and detect suspicious patterns of activity for immediate intervention. The combination of flexible authentication technology enabling easy step-up authentication when risk levels dictate along with ongoing user behavior monitoring provides a layered defense against malware threats. 26
  • 28. Bibliography [1] Nattakant Utakrit, "A Review of Browser Extensions, a Man-in-the- Browser Phishing Techniques Targeting Bank Customers" [2] Philipp Gühring, "Concepts against Man-in-the-Browser Attacks" [3] http://securityblog.s21sec.com/ [4] "Evolution of Zeus botnet", http://www.symantec.com/connect/ blogs/evolution-zeus-botnet [5] "How trojan.Zbot.B!inf uses crypto api" http://www.symantec.com/ connect/blogs/how-trojanzbotbinf-uses-crypto-api [6] RSA Labs, "MAKING SENSE OF MAN-IN-THE-BROWSER ATTACKS", http://www.rsa.com/products/consumer/whitepapers/ 10459_MITB_WP_0611.pdf [7] Frank Kim and Ed Skoudis, "Protecting Your Web Apps", http://www.sans.org/reading_room/application_security/ protecting_web_apps.pdf [8] Prajwol Kumar Nakarmi & Sajjad Rizvi, "Man in the Browser Attack" [9] Karel Miko, "Internet Banking Attacks" [10] http://www.cacert.at/svn/sourcerer/CAcert/SecureClient.pdf 27