Ice IX Trojan redirects bank phone calls to cyber criminals

A data-stealing Trojan called Ice IX is targeting the phone accounts of bank customers in the UK and US

A data-stealing Trojan called Ice IX allows cyber criminals to divert customers' calls to their banks in the UK and US.

Ice IX, a variant of the ZeuS financial malware platform, captures bank account information. But it can also capture information on the telephone accounts of online banking customers, according to researchers at security firm Trusteer.

“This allows attackers to divert calls from the bank intended for their customer to attacker-controlled phone numbers,” said Amit Klein, chief technology officer at Trusteer.

Cyber criminals are executing fraudulent transactions using the stolen credentials and redirecting the bank’s post-transaction verification phone calls to professional criminal caller services that approve the transactions, he said.

In one attack captured by Trusteer researchers, at login the malware stole the victim’s user ID and password, memorable information/secret question answer, date of birth and account balance.

Next, the victim was asked to update contact phone numbers and select the name of their service provider from a drop-down list, including BT, TalkTalk and Sky

To enable the attacker to modify the victim’s phone service settings, the victim is then asked to submit their telephone account number.

“This is very private data, typically only known to the phone subscriber and the phone company, and is typically used by the phone company to verify the identity of the subscriber and authorise sensitive account modifications such as call forwarding,” said Klein.

The fraudsters justify this request by saying the information is required as a part of verification process caused by "a malfunction of the bank’s anti-fraud system with its landline phone service provider".

“Fraudsters are increasingly turning to these post-transaction attack methods to hide fraudulent activity from the victim and block e-mail and phone communication from the bank,” said Klein.

This allows attackers to circumvent security mechanisms that look for anomalies once transactions have already been executed by the user, Klein said.

However, Klein said post-transaction attacks like these can be detected by security systems that search for specific malware characteristics before transactions are submitted and allow the online banking application to stop fraud by changing business flows such as blocking money transfers and declining to add a payee.  

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT for telecoms and internet organisations

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

This is one grave issue that needs to be resolved. As the internet gets more complicated, the hackers are getting more good in their craft, and this bank calls redirecting to the cybercriminals needs to  be resolved soon. 

Cancel

When people started to believe more on internet technology the hackers take advantage and  spoil .

Cancel

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close