<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Gfedon</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Gfedon"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Gfedon"/>
		<updated>2026-05-23T14:44:34Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Giorgio_fedon.jpg&amp;diff=152774</id>
		<title>File:Giorgio fedon.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Giorgio_fedon.jpg&amp;diff=152774"/>
				<updated>2013-06-03T20:23:25Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: uploaded a new version of &amp;amp;quot;File:Giorgio fedon.jpg&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152773</id>
		<title>EUTour2013 Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152773"/>
				<updated>2013-06-03T20:11:45Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''OWASP EU TOUR 2013''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | == TRAINING SESSIONS == &lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: #4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt;'''SPAIN - Barcelona'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.03&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Cerullof.jpg|150px]]&amp;lt;br&amp;gt;Fabio Cerullo&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: Desarrollo Seguro usando OWASP ESAPI'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Este curso tiene como objetivo proporcionar los conocimientos y recursos necesarios para mejorar la seguridad de las aplicaciones Java utilizando las librerias OWASP Enterprise Security API (ESAPI). Estas librerias se han diseñado para que sea más fácil para los desarrolladores mejorar la seguridad en aplicaciones existentes, como asi tambien utilizarlas como base para el desarrollo de nuevas aplicaciones. Los principios generales aprendidos en el curso se puede aplicar en el contexto de otros lenguajes de programación.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Fabio Cerullo, CEO y fundador de Cycubix, ayuda a clientes de todo el mundo a mejorar la seguridad de aplicaciones desarrolladas internamente o por terceros, mediante la definición de políticas y normas, implementando iniciativas de desarrollo seguro y gestión de riesgos, así como brindando capacitación sobre el tema a desarrolladores, auditores, ejecutivos y profesionales.&amp;lt;br&amp;gt;&lt;br /&gt;
Como miembro de la Fundación OWASP, Fabio se encarga de coordinar actividades globales de concientizacion sobre seguridad de aplicaciones con empresas privadas, gobiernos e instituciones educativas.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 8 horas (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 250€ No miembros / 200€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingesapi HAGA CLIC AQUI!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;14:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;br&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Simonroses.png|150px]]&amp;lt;br&amp;gt;Simón Roses&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OSINT + Python = Custom Hacking Workshop'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Taller práctico que combina el arte de OSINT (Open Source Inteligence) mediante el desarrollo de scripts en Python utilizando diversas API y librerías disponibles.  A lo largo del taller se realizarán ejercicios prácticos con el objetivo de asimilar los conceptos por parte del alumno.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Para entrar en materia se recomienda la lectura del siguiente artículo:&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.simonroses.com/es/2013/05/osint-python-hacking-a-medida/.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Simón Roses eslicenciado en Informática por Suffolk University (Boston), Postgrado en E-Commerce, Harvard University (Boston) y Executive MBA, Instituto de Empresa (Madrid).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
En la actualidad es el CEO de VULNEX.  Anteriormente formó parte de Microsoft, PriceWaterhouseCoopers y @Stake.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creador y colaborador en varios proyectos de código abierto de seguridad como OWASP Pantera y LibExploit, además de publicar avisos en seguridad de conocidos productos.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ponente habitual en eventos del sector de seguridad incluyendo BlackHat, RSA, OWASP, DeepSec, Source y Technets de seguridad de Microsoft.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CISSP, CEH y CSSLP.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (14:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingcustomhacking HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Matiaskatz.png]]&amp;lt;br&amp;gt;Matias Katz&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OWASP Top 5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Esta formación incorporará las técnicas de ataque a plataformas Web más importantes en la actualidad, estandarizadas mediante la norma OWASP Top 5. El curso presentará al alumno la forma de realizar estos ataques, y las contramedidas necesarias para mitigar su riesgo en sus desarrollos. La clase contará con contenido teórico y demostraciones prácticas e interactivas de laboratorio. Esta formación está orientada a desarrolladores, administradores de bases de datos, analistas de sistemas, auditores de seguridad, jefes de proyecto, así como cualquier otro interesado en las principales técnicas de ataque y defensa en aplicaciones Web.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Matias Katz is an IT architect and a security specialist. He's CISSP, CEH and MCSE certified, and has 10 years of experience in the field, focusing in the implementation of security audits, in infrastructures and critic applications for big organizations, both private and public.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After working at IBM for several years, in 2008 Matias founded Mkit Argentina (link: http://www.mkit.com.ar), a company that specializes in performing security audits, vulnerability analysis and penetration tests to organizations, companies and the public sector. The company also gives training of a high technical level for companies, organizations and end-users.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Matias also works as an external consultant for the computer crimes division of the federal police department in Argentina, where he collaborates in open cases through the acquirement of digital evidence and performing active investigations for the potential suspects.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He is a professor in 3 universities in Argentina, both in engineering courses and information security post-graduate degree courses.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He has presented at some of the most important security conferences, like BlackHat, Ekoparty, H2HC, Campus Party. He has dozens of published papers, and has created many tools used daily by security professionals world-wide, for their security audits.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingtop5 HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Tuesday, June 25th, 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | TCube&amp;lt;br&amp;gt;32 - 34 Castle Street, Dublin 2, Ireland&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Paco2.jpg|150px]]&amp;lt;br&amp;gt;Paco Hope&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with Web programming environments and technologies including JavaScript &lt;br /&gt;
and HTML. Completion of the Foundations of Software Security, Attack and Defense, or OWASP Top Ten + 2 courses is &lt;br /&gt;
highly recommended.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
&lt;br /&gt;
Mr. Hope is a Principal Consultant for Cigital with over 12 years experience in the securing of software and systems. He sets the technical direction in Europe and leads consultants delivering static source code analysis, architectural risk assessments, vulnerability assessments, and penetration tests.&lt;br /&gt;
&lt;br /&gt;
His experience covers web applications, online gaming (gambling), embedded gaming devices, lotteries, and business-to-business transaction systems. He has assessed systems for small startups with thousands of lines of code, and massive enterprises with thousands of applications and millions of lines of code.&lt;br /&gt;
&lt;br /&gt;
He is a frequent conference speaker at such venues as OWASP, RSA (US and Europe), Security B-Sides, and SecAppDev. He speaks on issues like integrating security into the software development lifecycle (SDLC), securing web applications, and secure random number generation.&lt;br /&gt;
&lt;br /&gt;
Paco is also involved in the leadership of the London Chapter of (ISC)2. He also serves on (ISC)2's Application Security Advisory Board, helping to advise on the direction of the Certified Secure Software Lifecycle Professional (CSSLP) certification. He has held the CISSP for nearly 10 years and the CSSLP since shortly after its creation.&lt;br /&gt;
&lt;br /&gt;
Mr. Hope has co-authored two books on software security: the Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. He has also authored a chapter of Gary McGraw's Building Security In.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' 350€ Non members / 300€ OWASP members. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration link''': [Link].'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: #4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt;'''ITALY - Rome'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Friday 28th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Università Degli Studi Roma Tre&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:giorgio_fedon.jpg]]&amp;lt;br&amp;gt;Giorgio Fedon&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Title: Mobile Application Security and Security Development Introduction'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Students will learn mobile hacking techniques and remediation strategies for Android and iPhone operating systems. They will understand platform security models, mobile application secure design, mobile application security errors, mobile application vulnerabilities related to in-house development. Exploiting techniques for operating system components are explained in the extent they may impact on a company SSDLC process for their mobile applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
Giorgio Fedon is the COO and a cofounder of Minded Security, where he is responsible for running daily operations of the company and managing Professional Services.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior to founding Minded Security, Giorgio was employed as senior security consultant and penetration tester at Emaze Networks S.p.a., delivered code auditing, Forensic and Log analysis, Malware Analysis and complex Penetration Testing services to some of the most important Companies as Banks and Public Agencies in Italy. He participated as speaker in many national and international events talking mainly about web security and malware obfuscation techniques. He was also employed at IBM System &amp;amp; Technology Group in Dublin (Ireland).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Language:''' English and Italian&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' The prices are: 125 Euro for non members / 100 Euro for members.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration Link''': [http://www.regonline.com/eutour13itatrainingmobile Register Here].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Giorgio_fedon.jpg&amp;diff=152772</id>
		<title>File:Giorgio fedon.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Giorgio_fedon.jpg&amp;diff=152772"/>
				<updated>2013-06-03T20:06:56Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152771</id>
		<title>EUTour2013 Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152771"/>
				<updated>2013-06-03T20:06:39Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''OWASP EU TOUR 2013''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | == TRAINING SESSIONS == &lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: #4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt;'''SPAIN - Barcelona'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.03&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Cerullof.jpg|150px]]&amp;lt;br&amp;gt;Fabio Cerullo&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: Desarrollo Seguro usando OWASP ESAPI'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Este curso tiene como objetivo proporcionar los conocimientos y recursos necesarios para mejorar la seguridad de las aplicaciones Java utilizando las librerias OWASP Enterprise Security API (ESAPI). Estas librerias se han diseñado para que sea más fácil para los desarrolladores mejorar la seguridad en aplicaciones existentes, como asi tambien utilizarlas como base para el desarrollo de nuevas aplicaciones. Los principios generales aprendidos en el curso se puede aplicar en el contexto de otros lenguajes de programación.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Fabio Cerullo, CEO y fundador de Cycubix, ayuda a clientes de todo el mundo a mejorar la seguridad de aplicaciones desarrolladas internamente o por terceros, mediante la definición de políticas y normas, implementando iniciativas de desarrollo seguro y gestión de riesgos, así como brindando capacitación sobre el tema a desarrolladores, auditores, ejecutivos y profesionales.&amp;lt;br&amp;gt;&lt;br /&gt;
Como miembro de la Fundación OWASP, Fabio se encarga de coordinar actividades globales de concientizacion sobre seguridad de aplicaciones con empresas privadas, gobiernos e instituciones educativas.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 8 horas (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 250€ No miembros / 200€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingesapi HAGA CLIC AQUI!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;14:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;br&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Simonroses.png|150px]]&amp;lt;br&amp;gt;Simón Roses&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OSINT + Python = Custom Hacking Workshop'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Taller práctico que combina el arte de OSINT (Open Source Inteligence) mediante el desarrollo de scripts en Python utilizando diversas API y librerías disponibles.  A lo largo del taller se realizarán ejercicios prácticos con el objetivo de asimilar los conceptos por parte del alumno.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Para entrar en materia se recomienda la lectura del siguiente artículo:&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.simonroses.com/es/2013/05/osint-python-hacking-a-medida/.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Simón Roses eslicenciado en Informática por Suffolk University (Boston), Postgrado en E-Commerce, Harvard University (Boston) y Executive MBA, Instituto de Empresa (Madrid).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
En la actualidad es el CEO de VULNEX.  Anteriormente formó parte de Microsoft, PriceWaterhouseCoopers y @Stake.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creador y colaborador en varios proyectos de código abierto de seguridad como OWASP Pantera y LibExploit, además de publicar avisos en seguridad de conocidos productos.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ponente habitual en eventos del sector de seguridad incluyendo BlackHat, RSA, OWASP, DeepSec, Source y Technets de seguridad de Microsoft.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CISSP, CEH y CSSLP.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (14:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingcustomhacking HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Matiaskatz.png]]&amp;lt;br&amp;gt;Matias Katz&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OWASP Top 5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Esta formación incorporará las técnicas de ataque a plataformas Web más importantes en la actualidad, estandarizadas mediante la norma OWASP Top 5. El curso presentará al alumno la forma de realizar estos ataques, y las contramedidas necesarias para mitigar su riesgo en sus desarrollos. La clase contará con contenido teórico y demostraciones prácticas e interactivas de laboratorio. Esta formación está orientada a desarrolladores, administradores de bases de datos, analistas de sistemas, auditores de seguridad, jefes de proyecto, así como cualquier otro interesado en las principales técnicas de ataque y defensa en aplicaciones Web.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Matias Katz is an IT architect and a security specialist. He's CISSP, CEH and MCSE certified, and has 10 years of experience in the field, focusing in the implementation of security audits, in infrastructures and critic applications for big organizations, both private and public.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After working at IBM for several years, in 2008 Matias founded Mkit Argentina (link: http://www.mkit.com.ar), a company that specializes in performing security audits, vulnerability analysis and penetration tests to organizations, companies and the public sector. The company also gives training of a high technical level for companies, organizations and end-users.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Matias also works as an external consultant for the computer crimes division of the federal police department in Argentina, where he collaborates in open cases through the acquirement of digital evidence and performing active investigations for the potential suspects.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He is a professor in 3 universities in Argentina, both in engineering courses and information security post-graduate degree courses.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He has presented at some of the most important security conferences, like BlackHat, Ekoparty, H2HC, Campus Party. He has dozens of published papers, and has created many tools used daily by security professionals world-wide, for their security audits.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingtop5 HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Tuesday, June 25th, 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | TCube&amp;lt;br&amp;gt;32 - 34 Castle Street, Dublin 2, Ireland&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Paco2.jpg|150px]]&amp;lt;br&amp;gt;Paco Hope&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with Web programming environments and technologies including JavaScript &lt;br /&gt;
and HTML. Completion of the Foundations of Software Security, Attack and Defense, or OWASP Top Ten + 2 courses is &lt;br /&gt;
highly recommended.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
&lt;br /&gt;
Mr. Hope is a Principal Consultant for Cigital with over 12 years experience in the securing of software and systems. He sets the technical direction in Europe and leads consultants delivering static source code analysis, architectural risk assessments, vulnerability assessments, and penetration tests.&lt;br /&gt;
&lt;br /&gt;
His experience covers web applications, online gaming (gambling), embedded gaming devices, lotteries, and business-to-business transaction systems. He has assessed systems for small startups with thousands of lines of code, and massive enterprises with thousands of applications and millions of lines of code.&lt;br /&gt;
&lt;br /&gt;
He is a frequent conference speaker at such venues as OWASP, RSA (US and Europe), Security B-Sides, and SecAppDev. He speaks on issues like integrating security into the software development lifecycle (SDLC), securing web applications, and secure random number generation.&lt;br /&gt;
&lt;br /&gt;
Paco is also involved in the leadership of the London Chapter of (ISC)2. He also serves on (ISC)2's Application Security Advisory Board, helping to advise on the direction of the Certified Secure Software Lifecycle Professional (CSSLP) certification. He has held the CISSP for nearly 10 years and the CSSLP since shortly after its creation.&lt;br /&gt;
&lt;br /&gt;
Mr. Hope has co-authored two books on software security: the Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. He has also authored a chapter of Gary McGraw's Building Security In.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' 350€ Non members / 300€ OWASP members. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration link''': [Link].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Friday 28th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Università Degli Studi Roma Tre&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:giorgio_fedon.jpg]]&amp;lt;br&amp;gt;Giorgio Fedon&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Title: Mobile Application Security and Security Development Introduction'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Students will learn mobile hacking techniques and remediation strategies for Android and iPhone operating systems. They will understand platform security models, mobile application secure design, mobile application security errors, mobile application vulnerabilities related to in-house development. Exploiting techniques for operating system components are explained in the extent they may impact on a company SSDLC process for their mobile applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
Giorgio Fedon is the COO and a cofounder of Minded Security, where he is responsible for running daily operations of the company and managing Professional Services.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior to founding Minded Security, Giorgio was employed as senior security consultant and penetration tester at Emaze Networks S.p.a., delivered code auditing, Forensic and Log analysis, Malware Analysis and complex Penetration Testing services to some of the most important Companies as Banks and Public Agencies in Italy. He participated as speaker in many national and international events talking mainly about web security and malware obfuscation techniques. He was also employed at IBM System &amp;amp; Technology Group in Dublin (Ireland).&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Language:''' English and Italian&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' The prices are: 125 Euro for non members / 100 Euro for members.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration Link''': [http://www.regonline.com/eutour13itatrainingmobile Register Here].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152770</id>
		<title>EUTour2013 Training</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=EUTour2013_Training&amp;diff=152770"/>
				<updated>2013-06-03T20:04:59Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;noinclude&amp;gt;{{:EUTour2013 header}}&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{|style=&amp;quot;vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;&amp;quot; align=&amp;quot;center&amp;quot; cellspacing=&amp;quot;5&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; height=&amp;quot;30&amp;quot; style=&amp;quot;background:#CCCCEE;&amp;quot; colspan=&amp;quot;2&amp;quot;       | '''OWASP EU TOUR 2013''' &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background:#EEEEEE;&amp;quot; colspan=&amp;quot;2&amp;quot;                   | == TRAINING SESSIONS == &lt;br /&gt;
| valign=&amp;quot;left&amp;quot; height=&amp;quot;80&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;left&amp;quot; colspan=&amp;quot;2&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;background: #4B0082;&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;span style=&amp;quot;color:#ffffff&amp;quot;&amp;gt;'''SPAIN - Barcelona'''&amp;lt;/span&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.03&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Cerullof.jpg|150px]]&amp;lt;br&amp;gt;Fabio Cerullo&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: Desarrollo Seguro usando OWASP ESAPI'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Este curso tiene como objetivo proporcionar los conocimientos y recursos necesarios para mejorar la seguridad de las aplicaciones Java utilizando las librerias OWASP Enterprise Security API (ESAPI). Estas librerias se han diseñado para que sea más fácil para los desarrolladores mejorar la seguridad en aplicaciones existentes, como asi tambien utilizarlas como base para el desarrollo de nuevas aplicaciones. Los principios generales aprendidos en el curso se puede aplicar en el contexto de otros lenguajes de programación.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Fabio Cerullo, CEO y fundador de Cycubix, ayuda a clientes de todo el mundo a mejorar la seguridad de aplicaciones desarrolladas internamente o por terceros, mediante la definición de políticas y normas, implementando iniciativas de desarrollo seguro y gestión de riesgos, así como brindando capacitación sobre el tema a desarrolladores, auditores, ejecutivos y profesionales.&amp;lt;br&amp;gt;&lt;br /&gt;
Como miembro de la Fundación OWASP, Fabio se encarga de coordinar actividades globales de concientizacion sobre seguridad de aplicaciones con empresas privadas, gobiernos e instituciones educativas.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 8 horas (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 250€ No miembros / 200€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingesapi HAGA CLIC AQUI!]'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;14:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;br&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Simonroses.png|150px]]&amp;lt;br&amp;gt;Simón Roses&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OSINT + Python = Custom Hacking Workshop'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Taller práctico que combina el arte de OSINT (Open Source Inteligence) mediante el desarrollo de scripts en Python utilizando diversas API y librerías disponibles.  A lo largo del taller se realizarán ejercicios prácticos con el objetivo de asimilar los conceptos por parte del alumno.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Para entrar en materia se recomienda la lectura del siguiente artículo:&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.simonroses.com/es/2013/05/osint-python-hacking-a-medida/.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Simón Roses eslicenciado en Informática por Suffolk University (Boston), Postgrado en E-Commerce, Harvard University (Boston) y Executive MBA, Instituto de Empresa (Madrid).&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
En la actualidad es el CEO de VULNEX.  Anteriormente formó parte de Microsoft, PriceWaterhouseCoopers y @Stake.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Creador y colaborador en varios proyectos de código abierto de seguridad como OWASP Pantera y LibExploit, además de publicar avisos en seguridad de conocidos productos.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Ponente habitual en eventos del sector de seguridad incluyendo BlackHat, RSA, OWASP, DeepSec, Source y Technets de seguridad de Microsoft.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
CISSP, CEH y CSSLP.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (14:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingcustomhacking HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Jueves, 13 de junio de 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Universitat Ramon Llull, La Salle - URL&amp;lt;br&amp;gt;Sant Joan de La Salle, 42&amp;lt;br&amp;gt;E-08022 Barcelona, Spain&amp;lt;BR&amp;gt;Aula: MFS.04&amp;lt;BR&amp;gt;&lt;br /&gt;
[http://goo.gl/maps/yZm2T Google maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Matiaskatz.png]]&amp;lt;br&amp;gt;Matias Katz&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Taller: OWASP Top 5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Esta formación incorporará las técnicas de ataque a plataformas Web más importantes en la actualidad, estandarizadas mediante la norma OWASP Top 5. El curso presentará al alumno la forma de realizar estos ataques, y las contramedidas necesarias para mitigar su riesgo en sus desarrollos. La clase contará con contenido teórico y demostraciones prácticas e interactivas de laboratorio. Esta formación está orientada a desarrolladores, administradores de bases de datos, analistas de sistemas, auditores de seguridad, jefes de proyecto, así como cualquier otro interesado en las principales técnicas de ataque y defensa en aplicaciones Web.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Perﬁl del instructor'''&lt;br /&gt;
&lt;br /&gt;
Matias Katz is an IT architect and a security specialist. He's CISSP, CEH and MCSE certified, and has 10 years of experience in the field, focusing in the implementation of security audits, in infrastructures and critic applications for big organizations, both private and public.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
After working at IBM for several years, in 2008 Matias founded Mkit Argentina (link: http://www.mkit.com.ar), a company that specializes in performing security audits, vulnerability analysis and penetration tests to organizations, companies and the public sector. The company also gives training of a high technical level for companies, organizations and end-users.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Matias also works as an external consultant for the computer crimes division of the federal police department in Argentina, where he collaborates in open cases through the acquirement of digital evidence and performing active investigations for the potential suspects.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He is a professor in 3 universities in Argentina, both in engineering courses and information security post-graduate degree courses.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
He has presented at some of the most important security conferences, like BlackHat, Ekoparty, H2HC, Campus Party. He has dozens of published papers, and has created many tools used daily by security professionals world-wide, for their security audits.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duracion:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Precio:''' 125€ No miembros / 100€ Miembros OWASP. Existen tambien descuentos para grupos y miembros de [http://www.ati.es ATI].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Regístrese a este taller''': [http://www.regonline.com/eutour13esptrainingtop5 HAGA CLIC AQUI!].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Tuesday, June 25th, 2013&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 18:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | TCube&amp;lt;br&amp;gt;32 - 34 Castle Street, Dublin 2, Ireland&amp;lt;BR&amp;gt;&amp;lt;BR&amp;gt;&lt;br /&gt;
[https://maps.google.ie/maps?q=32+-+34+Castle+Street,+Dublin+2,+Ireland&amp;amp;hl=en&amp;amp;ll=53.343391,-6.269084&amp;amp;spn=0.004977,0.013679&amp;amp;sll=53.343392,-6.269086&amp;amp;sspn=0.009954,0.027359&amp;amp;hnear=34+Castle+St,+Dublin+2,+County+Dublin&amp;amp;t=m&amp;amp;z=17 Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Paco2.jpg|150px]]&amp;lt;br&amp;gt;Paco Hope&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''DEFENSIVE PROGRAMMING – JAVASCRIPT AND HTML5'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
HTML5 is the fifth revision of the HTML standard. HTML5, and its integration with JavaScript, introduces new &lt;br /&gt;
security risks that we need to carefully consider when writing web front-end code. Modern web-based software, including &lt;br /&gt;
mobile web front-end applications, makes heavy use of innovative JavaScript and HTML5 browser support to deliver &lt;br /&gt;
advanced user experiences. Front-end developers focus their efforts on creating this experience and are generally not aware &lt;br /&gt;
of the security implications of the technologies they use. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Defensive Programming – JavaScript/HTML5 course helps web front-end developers understand the risks involved with &lt;br /&gt;
manipulating the HTML Document Object Model (DOM) and using the advanced features of JavaScript and HTML 5 such as &lt;br /&gt;
cross-domain requests and local storage. The course reinforces some important security aspects of modern browser &lt;br /&gt;
architecture and presents the student with defensive programming techniques that can be immediately applied to prevent common vulnerabilities from being introduced. Additionally, the course provides a detailed description of typical JavaScript sources and sinks and explains how they can be used to detect problems in code.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prerequisites: Students should be familiar with Web programming environments and technologies including JavaScript &lt;br /&gt;
and HTML. Completion of the Foundations of Software Security, Attack and Defense, or OWASP Top Ten + 2 courses is &lt;br /&gt;
highly recommended.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
&lt;br /&gt;
Mr. Hope is a Principal Consultant for Cigital with over 12 years experience in the securing of software and systems. He sets the technical direction in Europe and leads consultants delivering static source code analysis, architectural risk assessments, vulnerability assessments, and penetration tests.&lt;br /&gt;
&lt;br /&gt;
His experience covers web applications, online gaming (gambling), embedded gaming devices, lotteries, and business-to-business transaction systems. He has assessed systems for small startups with thousands of lines of code, and massive enterprises with thousands of applications and millions of lines of code.&lt;br /&gt;
&lt;br /&gt;
He is a frequent conference speaker at such venues as OWASP, RSA (US and Europe), Security B-Sides, and SecAppDev. He speaks on issues like integrating security into the software development lifecycle (SDLC), securing web applications, and secure random number generation.&lt;br /&gt;
&lt;br /&gt;
Paco is also involved in the leadership of the London Chapter of (ISC)2. He also serves on (ISC)2's Application Security Advisory Board, helping to advise on the direction of the Certified Secure Software Lifecycle Professional (CSSLP) certification. He has held the CISSP for nearly 10 years and the CSSLP since shortly after its creation.&lt;br /&gt;
&lt;br /&gt;
Mr. Hope has co-authored two books on software security: the Web Security Testing Cookbook and Mastering FreeBSD and OpenBSD Security. He has also authored a chapter of Gary McGraw's Building Security In.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 8 hours (09:00h - 18:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' 350€ Non members / 300€ OWASP members. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration link''': [Link].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:20%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Date''' &lt;br /&gt;
| style=&amp;quot;width:80%&amp;quot; valign=&amp;quot;middle&amp;quot;  bgcolor=&amp;quot;#CCCCEE&amp;quot; align=&amp;quot;center&amp;quot; colspan=&amp;quot;0&amp;quot; | '''Location'''&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;center&amp;quot; | Friday 28th June&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;09:00h - 13:00h&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#dbdbf3&amp;quot; align=&amp;quot;left&amp;quot; | Università Degli Studi Roma Tre&lt;br /&gt;
|-&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:]]&amp;lt;br&amp;gt;Giorgio Fedon&lt;br /&gt;
| valign=&amp;quot;middle&amp;quot; bgcolor=&amp;quot;#EEEEEE&amp;quot; align=&amp;quot;justify&amp;quot; | '''Title: Mobile Application Security and Security Development Introduction'''&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Students will learn mobile hacking techniques and remediation strategies for Android and iPhone operating systems. They will understand platform security models, mobile application secure design, mobile application security errors, mobile application vulnerabilities related to in-house development. Exploiting techniques for operating system components are explained in the extent they may impact on a company SSDLC process for their mobile applications.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Instructor Profile'''&lt;br /&gt;
Giorgio Fedon is the COO and a cofounder of Minded Security, where he is responsible for running daily operations of the company and managing Professional Services.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Prior to founding Minded Security, Giorgio was employed as senior security consultant and penetration tester at Emaze Networks S.p.a., delivered code auditing, Forensic and Log analysis, Malware Analysis and complex Penetration Testing services to some of the most important Companies as Banks and Public Agencies in Italy. He participated as speaker in many national and international events talking mainly about web security and malware obfuscation techniques. He was also employed at IBM System &amp;amp; Technology Group in Dublin (Ireland).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Duration:''' 4 horas (09:00h - 13:00h)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Price:''' The prices are: 125 Euro for non members / 100 Euro for members.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Registration Link''': [http://www.regonline.com/eutour13itatrainingmobile Register Here].'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|} &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123790</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123790"/>
				<updated>2012-02-05T14:08:06Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid for a very short period of time. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
* This authentication measure may need UI redressing or automation to be bypassed, introducing important anomalies that can be detected. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Redressing Attack with custom WebInject]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123789</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123789"/>
				<updated>2012-02-05T14:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid for a very short period of time. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
* This authentication measure may need UI redressing or automation to be bypassed, introducing important anamalies. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Redressing Attack with custom WebInject]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123788</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123788"/>
				<updated>2012-02-05T14:06:32Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid for a very short period of time. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . &lt;br /&gt;
* This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
This authentication measure needs UI redressing or automation to be bypassed. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Redressing Attack with custom WebInject]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123787</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123787"/>
				<updated>2012-02-05T14:05:43Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid in a very short time-window. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . &lt;br /&gt;
* This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
This authentication measure needs UI redressing or automation to be bypassed. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Redressing Attack with custom WebInject]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123786</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123786"/>
				<updated>2012-02-05T14:04:50Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid in a very short time-window. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . &lt;br /&gt;
* This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
This authentication measure needs UI redressing or automation to be bypassed. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Otp UI Redressing]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Otp_ui_redressing.png&amp;diff=123785</id>
		<title>File:Otp ui redressing.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Otp_ui_redressing.png&amp;diff=123785"/>
				<updated>2012-02-05T14:04:18Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Otp_token.png&amp;diff=123784</id>
		<title>File:Otp token.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Otp_token.png&amp;diff=123784"/>
				<updated>2012-02-05T14:03:31Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123783</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123783"/>
				<updated>2012-02-05T14:03:19Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid in a very short time-window. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . &lt;br /&gt;
* This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
This authentication measure needs UI redressing or automation to be bypassed. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Otp UI Redressing]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123782</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123782"/>
				<updated>2012-02-05T14:02:57Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* OTP (Time Based, Click Based) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Risk Evaluation:&lt;br /&gt;
Basic OTPs are vulnerable to HTML Injection and to other more sophisticated techniques, but give to the bank the following important improvements in terms of security:&lt;br /&gt;
* Tokens are valid in a very short time-window. Attackers need to engage human assistance to successfully abuse the compromised tokens in the valid time-window . &lt;br /&gt;
* This involves using Instant Messaging and user monitoring that leverages additional costs at their side.&lt;br /&gt;
This authentication measure needs UI redressing or automation to be bypassed. &lt;br /&gt;
&lt;br /&gt;
[[File:otp_token.png|thumb|alt=Basic Otp Token|Basic Otp Token]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A one-time password (OTP) is a password that is valid for only one login session or transaction. OTPs avoid a number of shortcomings that are associated with traditional (static) passwords. OTPs are difficult for human beings to memorize. Therefore they require additional technology in order to work and this technology may be implemented in software tools or by using external hardware devices (Hardware tokens). Basic OTPs are based on cryptographic One-Way Algorithms and initialized with a different key per each user to avoid impersonation attacks. In addition each token usage is blacklisted and cannot be used a second time to avoid replay attacks. &lt;br /&gt;
Since basic OTP standards do not have a direct communication with the remote server, they need indirect standards for assuring synchronization with the remote infrastructure. Synchronization can be achieved on time-synchronization between the authentication server and the client providing the password (OTPs are valid only for a short period of time) or computing the number of previously generated passwords and set a range of valid passwords (if the user press to often the button the device will go out of sync).&lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Even if this technology seems very resilient against malware attacks, it doesn't! Basic Otps can be defeated very easily with User Interface redressing. This attack is accomplished using the infamous features called WebInjects that permit to inject arbitrary HTML into the original Bank Login pages.&lt;br /&gt;
As we previously said, the Token is valid for a single transaction and is blacklisted after the first usage. Malware attackers will never let the token to arrive at the bank, so the bank can not blacklist that information. To defeat time restriction window, they also may make use of Instant Messaging plugins to have a real time communication of the token to the attacker.&lt;br /&gt;
&lt;br /&gt;
[[File:otp_ui_redressing.png|thumb|alt=Otp UI Redressing|Otp UI Redressing]]&lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123781</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123781"/>
				<updated>2012-02-05T12:18:20Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix B: Banking Malware Families (Active in 2012) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Stored Password Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123780</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123780"/>
				<updated>2012-02-05T12:17:35Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix B: Banking Malware Families (Active in 2012) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Credential Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123779</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123779"/>
				<updated>2012-02-05T12:17:13Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix B: Banking Malware Families (Active in 2012) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources (e.g. slides 26-30 The Bank in the Browser Presentation - G. Fedon ), here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Timing'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Credential Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123778</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123778"/>
				<updated>2012-02-05T12:14:38Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix B: Banking Malware Families (Active in 2012) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources, here is a quick summary of Banking Malware features updated as of 2012.&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Timing'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Credential Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Malware_Attack_Vectors2.png&amp;diff=123777</id>
		<title>File:Malware Attack Vectors2.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Malware_Attack_Vectors2.png&amp;diff=123777"/>
				<updated>2012-02-05T12:13:26Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123776</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123776"/>
				<updated>2012-02-05T12:12:35Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix B: Banking Malware Families (Active in 2012) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
&lt;br /&gt;
Taken as inspiration from Marco Morana's Presentation and from other sources, here is a quick summary of Banking Malware features updated&lt;br /&gt;
&lt;br /&gt;
[[File:Malware_Attack_Vectors2.png|thumb|alt=Malware Attack Vectors Summary]]&lt;br /&gt;
&lt;br /&gt;
Schema summarizes every banking trojan by giving the following informations:&lt;br /&gt;
&lt;br /&gt;
*'''Attack Capabilities'''&lt;br /&gt;
*'''Timing'''&lt;br /&gt;
*'''Type'''&lt;br /&gt;
&lt;br /&gt;
'''Attack Capabilites''' describes the features of the involved trojan, and immediately below the technique used to implement the given feature.&lt;br /&gt;
&lt;br /&gt;
*'''HTTP Injection'''&lt;br /&gt;
*'''Browse Redirect'''&lt;br /&gt;
*'''Form Grabbing'''&lt;br /&gt;
*'''Credential Theft'''&lt;br /&gt;
*'''Keystroke Logging'''&lt;br /&gt;
*'''Bypass MFA'''&lt;br /&gt;
*'''ScreenCapture / VideoCapture'''&lt;br /&gt;
*'''Certificate Theft'''&lt;br /&gt;
*'''Install Backdoor'''&lt;br /&gt;
*'''Instant Message'''&lt;br /&gt;
&lt;br /&gt;
'''Type''' field describes what kind how the malware operates:&lt;br /&gt;
&lt;br /&gt;
*'''Automatic'''&lt;br /&gt;
*'''Manual'''&lt;br /&gt;
&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
Tracking SpyEye:&lt;br /&gt;
&lt;br /&gt;
* [https://spyeyetracker.abuse.ch/ SpyEye Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this Trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significant:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
Tracking ZeuS:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication]&lt;br /&gt;
* [http://blog.eset.com/2012/01/26/facebook-fakebook-new-trends-in-carberp-activity Facebook New Trends in Carberp Activity]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside explorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network traffic and attempts to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
Sunspot appeared for the first time in late 2011 as MiTB based trojan designed to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Features:&lt;br /&gt;
&lt;br /&gt;
*'''Browser Code Injection'''&lt;br /&gt;
*'''KeyStroke Logger'''&lt;br /&gt;
*'''Screenshotting Capabilities'''&lt;br /&gt;
*'''Steals Sensitive Personal Information necessary to carry out User Impersonation Attacks'''&lt;br /&gt;
*'''Good AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
Sunspot works on 32bit and 64bit Systems from Windows XP to Windows 7.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.theregister.co.uk/2011/05/11/sunspot_banking_trojan/ Sunspot Banking Trojan]&lt;br /&gt;
* [http://www.trusteer.com/blog/windows-malware-morphs-financial-fraud-platform Windows Malware Morphs into Financial Fraud Platform]&lt;br /&gt;
&lt;br /&gt;
=== Oddjob ===&lt;br /&gt;
&lt;br /&gt;
Oddjob Financial Trojan has been publicly reported for the first time 22 February 2011, the peculiar characteristic of Oddjob is the ability to keep open Victim's Session even after they Logout, this implies that Criminals will be able to steal money by Impersonating the Victim by tapping the Session ID.&lt;br /&gt;
&lt;br /&gt;
Oddjob works by injecting malicious code into Internet Explorer and Firefox browsers, the code is contained in custom configuration files. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Will follow a quick summary of the Trojan Functionalities:&lt;br /&gt;
&lt;br /&gt;
*'''Intercepts GET and POST requests'''&lt;br /&gt;
*'''HTML Code Injection via MiTB Approach'''&lt;br /&gt;
*'''Session Hijacking'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Session hijacking is performed by changing Logout functionality via malicious html/js injected code, victim will inadvertently keep session open and fraudsters will commit the money transaction.&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.trusteer.com/blog/new-financial-trojan-keeps-online-banking-sessions-open-after-users-%E2%80%9Clogout%E2%80%9D New Financial Trojan Keeps Online Banking Sessions Open after Users “Logout”]&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
Ramnit is a prolific malware that show a wide range of morphings during its arc of existence, between these variations there is also the Financial Stealing one.&lt;br /&gt;
&lt;br /&gt;
Ramnit is essentially a Backdoor Trojan with the ability to perform also MiTB Attacks.&lt;br /&gt;
&lt;br /&gt;
List of Features:&lt;br /&gt;
&lt;br /&gt;
*'''MiTB Capabilities'''&lt;br /&gt;
*'''Backdoor Capabilities'''&lt;br /&gt;
*'''File Infector Office Files, Windows Executables'''&lt;br /&gt;
*'''SSL Secured C&amp;amp;C Communication'''&lt;br /&gt;
*'''AntiVirus bypassing Capabilities'''&lt;br /&gt;
*'''Cookie Grabber'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.microsoft.com/security/portal/threat/Encyclopedia/Entry.aspx?Name=Virus%3AWin32%2FRamnit.A Win32/Ramnit.A]&lt;br /&gt;
* [http://www.trusteer.com/blog/ramnit-evolution-%E2%80%93-worm-financial-malware Ramnit Evolution – From Worm to Financial Malware]&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123598</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123598"/>
				<updated>2012-02-02T00:22:17Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* From user infection to cash out */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
Interesting Resources for further reading:&lt;br /&gt;
* [http://www.youtube.com/watch?v=_2K8kRSlJXw '''MULTIDISCIPLINARY BANK ATTACKS, Gunter Ollman'''] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers (e.g. Plugin Update)&lt;br /&gt;
* Guerrilla Awarness&lt;br /&gt;
Es. http://phishme.com/&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised customers&lt;br /&gt;
* Have in place a Malware response process&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Invest in user Informative (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel authentication&lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Get money back from other banks&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123507</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123507"/>
				<updated>2012-01-31T13:54:48Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix A: Security Considerations about Authentication Solutions and Malware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/marco_morana/owasp-app-seceu2011version1&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
Urlzone is a Banking Trojan appeared in 2009, its main feature is the ability to hide the evidence of the fraud by changing on fly the balance showed to the Victim. &lt;br /&gt;
&lt;br /&gt;
To accomplish money stealing Urlzone uses a classical MiTB Approach, it works on the following browsers&lt;br /&gt;
&lt;br /&gt;
*'''FireFox'''&lt;br /&gt;
*'''Internet Explorer 6,7,8'''&lt;br /&gt;
*'''Opera'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.wired.com/images_blogs/threatlevel/2009/09/finjan-cyberintel_sept_2009-sf.pdf Finjan CyberIntel Report September 2009]&lt;br /&gt;
* [http://news.cnet.com/8301-27080_3-10363836-245.html Banking Trojan steals money from under your nose]&lt;br /&gt;
* [http://www.zdnet.com/blog/security/the-case-of-the-fake-money-mules-inside-the-urlzone-trojan-network/4527 The case of the fake money-mules: Inside the URLZone Trojan network ]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/the-arms-race-between-black-hats-and-white-hats-steps-up-with-urlzone-trojan/ RSA banking Trojan research underscores problem tracking cybercriminals]&lt;br /&gt;
&lt;br /&gt;
=== Gozi ===&lt;br /&gt;
&lt;br /&gt;
Banking trojan Gozi appeared for the first time in 2007 and was characterized by a Low Detection Rate and ability to Steal from SSL Encrypted Sessions.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
&lt;br /&gt;
*'''Steals SSL Data'''&lt;br /&gt;
*'''Steals Static Information from Banking Website'''&lt;br /&gt;
*'''Steals Dynamic Password Schemes like Two Factor Authentication and OTP'''&lt;br /&gt;
*'''KeyLogging Capabilities'''&lt;br /&gt;
*'''SSL Encrypted Communication with the C&amp;amp;C Server'''&lt;br /&gt;
*'''AntiVirus Bypassing Capabilities'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SSL Stealing Technique is described here [http://isc.sans.edu/diary.html?storyid=2498 Gozi Trojan Steals SSL Encrypted Data for Fun and Profit]&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.secureworks.com/research/threats/gozi/ Gozi Technical Analysis]&lt;br /&gt;
* [http://www.prweb.com/releases/2010/11/prweb4745544.htm Gozi Trojan - King of Evasion Continues to Avoid Sophisticated Detection]&lt;br /&gt;
&lt;br /&gt;
=== Shylock ===&lt;br /&gt;
&lt;br /&gt;
Shylock is a new Financial Malware, publicly reported for the first time on 7 September 2011. Main ability of this malware is to inject itself inside expolorer's code. Also it incorporates watchdog that prevents removing and rootkit functionality to hide itself.&lt;br /&gt;
&lt;br /&gt;
Features List:&lt;br /&gt;
*'''Gathering system information on compromised system and sends it to dropzone'''&lt;br /&gt;
*'''Downloading configuration that will be used from defined domain'''&lt;br /&gt;
*'''Injects malicious code into browser's code'''&lt;br /&gt;
*'''Hides using rootkit functionality'''&lt;br /&gt;
*'''Intercepts network trafic and atteps to add malicious code to network trafic'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://quequero.org/Shylock_via_volatility Shylock Technical Analysis]&lt;br /&gt;
* [http://www.symantec.com/security_response/writeup.jsp?docid=2011-092916-1617-99&amp;amp;tabid=2 Symantec report on Shylock]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Sunspot ===&lt;br /&gt;
&lt;br /&gt;
=== Ramnit ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=123505</id>
		<title>Project Information:template Anti-Malware Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=123505"/>
				<updated>2012-01-31T10:59:07Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT INFORMATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Anti-Malware Project'''&amp;lt;br&amp;gt;Defending Web Infrastructures Against Malware&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
“Malware is nowadays more than a single enemy: online crime has unified the forces for targeting any online banking customer. Banking Malware is ubiquitous because it’s constantly updated via country-specific configuration files and with modular plugins to fit any banking web application. In addition it can defeat the most sophisticated security protections actually implemented.”&lt;br /&gt;
&lt;br /&gt;
This project is about describing common flaws in security designs that have been adopted for protecting banking websites against malware, as well as a series of best practices that should be considered for evaluating and building better anti-malware solutions.&lt;br /&gt;
The project will be constantly updated with information taken from Owasp Community, Malware Analysis, Forensic Activities, as well as from any other validated source.&lt;br /&gt;
&lt;br /&gt;
The project delivery will be divided into Two parts. The first part will be a document containing guidelines directed to Banking Web Infrastructures owners. This document will be kept intentionally as short as possible and will have the main goal to raise the awareness on Malware threats and to precisely name a series of checklists that should be taken into consideration to significantly improve website security against malware.&lt;br /&gt;
&lt;br /&gt;
The second part will be a technical study dynamically updated in wiki-style format. The technical study will be the reference for the guidelines contained in the previous document. This study will try to analyze the most sophisticated Malware Techniques used in the 3 most spread Banking Malware families, as well as discuss the effectiveness of different security protections that are thought to be useful against Malware.&lt;br /&gt;
&lt;br /&gt;
The Technical Study will be made up of two teams: MRE (Malware Reverse Engineering Team) and AMTS (Anti-Malware Technology Solutions Team). MRE team will be in charge of studying the malware samples and to inoculate the techniques used against banking Websites; AMTS team will harvest the internet for any Web Infrastructural solution that claims to be Malware Proof for identifying its strengths and weaknesses.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Leader&amp;lt;br&amp;gt;[[User:Gfedon|'''Giorgio Fedon''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Contibutors&amp;lt;br&amp;gt;[[User:Vicente.aguilera|'''Vicente Aguilera''']]&amp;lt;br&amp;gt;[[User:Giuseppe_Bonfa|'''Giuseppe Bonfa''']]&amp;lt;br&amp;gt;[[User:Nikola_Milosevic|'''Nikola Milosevic''']]&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-anti-malware '''Subscribe here''']&amp;lt;br&amp;gt;[mailto:owasp-anti-malware@lists.owasp.org '''Use here''']&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
License&amp;lt;br&amp;gt;[http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Document''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Sponsors&amp;lt;br&amp;gt;[http://www.mindedsecurity.com '''Minded Security''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Projects''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Provisory '''[[:Category:OWASP Project Assessment#Alpha Quality Documentation Criteria|Apha Quality]]'''&amp;lt;br&amp;gt;(under review)&amp;lt;br&amp;gt;[[:OWASP Anti-Malware Project - Assessment Frame|Please see here for complete information.]]&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:OWASP Anti-Malware Project - Awareness Program|Anti-malware Awareness Program]]&amp;lt;br&amp;gt;[[:OWASP Anti-Malware - Knowledge Base|Anti-malware - Knowledge Base]]&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
if any, add link(s)&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123434</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123434"/>
				<updated>2012-01-30T13:48:03Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Containing the number of infected customers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers (e.g. Plugin Update)&lt;br /&gt;
* Guerrilla Awarness&lt;br /&gt;
Es. http://phishme.com/&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised customers&lt;br /&gt;
* Have in place a Malware response process&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Invest in user Informative (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel authentication&lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Get money back from other banks&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123431</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123431"/>
				<updated>2012-01-30T08:54:53Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Unhide the Infection */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers (e.g. Plugin Update)&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised customers&lt;br /&gt;
* Have in place a Malware response process&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Invest in user Informative (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel authentication&lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Get money back from other banks&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123430</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123430"/>
				<updated>2012-01-30T08:17:31Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Against Cashing Out */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers (e.g. Plugin Update)&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised customers&lt;br /&gt;
* Have in place a security response process&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Invest in user Informative (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel authentication&lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Get money back from other banks&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123413</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123413"/>
				<updated>2012-01-29T19:01:08Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substantial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analyzing puzzled screen-shot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123412</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123412"/>
				<updated>2012-01-29T19:00:17Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent. This solution alone does not give a substancial improvement in terms of security comparing it to the Password TextBox input, however attacker takes more time in analizing puzzled screenshot passwords so it's a valid approach in terms of defense in depth.&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123411</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123411"/>
				<updated>2012-01-29T17:00:29Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious software agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123410</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123410"/>
				<updated>2012-01-29T17:00:10Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123409</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123409"/>
				<updated>2012-01-29T16:59:40Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack simply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123408</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123408"/>
				<updated>2012-01-29T16:58:02Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack symply stores the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123407</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123407"/>
				<updated>2012-01-29T16:57:06Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of [http://en.wikipedia.org/wiki/Turing_test &amp;quot;turing test&amp;quot;] that could be understood by human users but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way. This kind of attack does not deaft the turing test, but symply store the information remotely for a subsequent interpretation by a human attacker.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123406</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123406"/>
				<updated>2012-01-29T16:52:30Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key pressed. &amp;quot;Click Grabbing&amp;quot; feature was born and with a minimal configuration was possible to defeat javascript password in a standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123405</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123405"/>
				<updated>2012-01-29T16:51:38Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Back in year 2002, after a couple of years, Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key. Click Grabbing plugins was born and with a minimal configuration was possible to defeat javascript password in standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123404</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123404"/>
				<updated>2012-01-29T16:50:49Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* TextField Static Password */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
''' External References: '''&lt;br /&gt;
&lt;br /&gt;
* http://www.infosectoday.com/Articles/Form_Grabbing/Form_Grabbing.htm&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
After a couple of years unfortunately Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key. Click Grabbing plugins was born and with a minimal configuration was possible to defeat javascript password in standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Js_virtual_keyboard.png&amp;diff=123403</id>
		<title>File:Js virtual keyboard.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Js_virtual_keyboard.png&amp;diff=123403"/>
				<updated>2012-01-29T16:49:55Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123402</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123402"/>
				<updated>2012-01-29T16:49:37Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
[[File:js_virtual_keyboard.png|thumb|alt=Javascript Keyboard|Javascript Keyboard]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
After a couple of years unfortunately Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key. Click Grabbing plugins was born and with a minimal configuration was possible to defeat javascript password in standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123401</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123401"/>
				<updated>2012-01-29T16:48:45Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
&amp;lt;add image&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
After a couple of years unfortunately Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key. Click Grabbing plugins was born and with a minimal configuration was possible to defeat javascript password in standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123400</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123400"/>
				<updated>2012-01-29T16:48:31Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Javascript Keyboard */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families with a minimal configuration of the malicious agent&lt;br /&gt;
&lt;br /&gt;
&amp;lt;add image&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
Javascript Keyboard was introduced more than a decade ago in response to Keylogging and Form Grabbing techniques used by Trojan Stealers. Javascript Keyboard works by creating a virtual keyboard on the screen with a dynamic layout; the random disposition of the keys  represent a sort of turing pattern that could be understood by humans but not by malicious robot-agents. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
After a couple of years unfortunately Malware Authors realized that they could visually grab images of the clicked key pressed (click area grabbing) or to video record the sequence of key. Click Grabbing plugins was born and with a minimal configuration was possible to defeat javascript password in standard and efficient way.&lt;br /&gt;
&lt;br /&gt;
'''External References:'''&lt;br /&gt;
From Fortiguard (Zeus trojan defeats a Virtual Javascript Keypad)&lt;br /&gt;
* http://www.youtube.com/watch?v=b9Vb4zS6ZmE&amp;amp;feature=player_embedded&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123399</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123399"/>
				<updated>2012-01-29T16:47:04Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* TextField Static Password */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different ways to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. [http://www.keepassx.org/ KeePassX] ). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123398</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123398"/>
				<updated>2012-01-29T16:42:51Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix A: Security Considerations about Authentication Solutions and Malware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different many to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. KeePassX). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Static_password.png&amp;diff=123397</id>
		<title>File:Static password.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Static_password.png&amp;diff=123397"/>
				<updated>2012-01-29T16:42:24Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123396</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123396"/>
				<updated>2012-01-29T16:42:06Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Appendix A: Security Considerations about Authentication Solutions and Malware */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
Actually Banking Malware families can bypass the vast majority of the world most secure authentication. How? The answer is simple: by tailoring an appropriate attack on the specific authentication schema with a bit of social engineering. Malware Authors know that the weakest link most of the times is the user himself.&lt;br /&gt;
&lt;br /&gt;
For more information:&lt;br /&gt;
&lt;br /&gt;
* http://www.slideshare.net/guestb1956e/csi2008-gunter-ollmann-maninthebrowser-presentation&lt;br /&gt;
* https://www.owasp.org/images/e/e4/AppsecEU09_The_Bank_in_The_Browser_Presentation_v1.1.pdf&lt;br /&gt;
&lt;br /&gt;
=== TextField Static Password ===&lt;br /&gt;
&lt;br /&gt;
'''Risk Evaluation:'''&lt;br /&gt;
&lt;br /&gt;
Vulnerable to vast majority of all Banking Malware families in their default configuration&lt;br /&gt;
&lt;br /&gt;
[[File:static_password.png|thumb|alt=Static Password|Static Password]]&lt;br /&gt;
&lt;br /&gt;
'''Description'''&lt;br /&gt;
&lt;br /&gt;
A password is a secret word or string of characters that is used for authentication, and is the world most used and simplest way of authenticating a user to a computer. “Static” means that Password does not change over time, unless manually updated. Textbox input field is the HTML element were password is inserted and this element is compatible with HID (Human Input Devices) such as hardware keyboards and Virtual Keyboards. &lt;br /&gt;
&lt;br /&gt;
'''How gets defeated'''&lt;br /&gt;
&lt;br /&gt;
Almost All banking malware can automatically log passwords using two components: Keylogging and Form Grabbing. A software Keylogger component can use a number of very different techniques, because operative systems offer many different many to know which key is pressing a user. Even if this component seems very powerful, it has the disadvantage of not logging the Clipboard. Users may copy and paste passwords for simplicity or security reasons: many password wallets suggest to use this approach (e.g. KeePassX). For this reason Banking Malware Authors prefer to log web based credentials using form grabbing components instead of keyloggers: from Wikipedia “this method intercepts the on submit API in browsers and collects web form data before it passes over the internet.”.&lt;br /&gt;
Since FormGrabbing is actually used by any major Banking Malware Family (e.g. Zeus, Spyeye, IceIX etc.) “text field” static password does not represent a secure way of authentication. In addition Malware families can automatically log any password field without using any particular configuration.&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=123395</id>
		<title>Project Information:template Anti-Malware Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=123395"/>
				<updated>2012-01-29T16:34:54Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT INFORMATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Anti-Malware Project'''&amp;lt;br&amp;gt;Defending Web Infrastructures Against Malware&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
“Malware is nowadays more than a single enemy: online crime has unified the forces for targeting any online banking customer. Banking Malware is ubiquitous because it’s constantly updated via country-specific configuration files and with modular plugins to fit any banking web application. In addition it can defeat the most sophisticated security protections actually implemented.”&lt;br /&gt;
&lt;br /&gt;
This project is about describing common flaws in security designs that have been adopted for protecting banking websites against malware, as well as a series of best practices that should be considered for evaluating and building better anti-malware solutions.&lt;br /&gt;
The project will be constantly updated with information taken from Owasp Community, Malware Analysis, Forensic Activities, as well as from any other validated source.&lt;br /&gt;
&lt;br /&gt;
The project delivery will be divided into Two parts. The first part will be a document containing guidelines directed to Banking Web Infrastructures owners. This document will be kept intentionally as short as possible and will have the main goal to raise the awareness on Malware threats and to precisely name a series of checklists that should be taken into consideration to significantly improve website security against malware.&lt;br /&gt;
&lt;br /&gt;
The second part will be a technical study dynamically updated in wiki-style format. The technical study will be the reference for the guidelines contained in the previous document. This study will try to analyze the most sophisticated Malware Techniques used in the 3 most spread Banking Malware families, as well as discuss the effectiveness of different security protections that are thought to be useful against Malware.&lt;br /&gt;
&lt;br /&gt;
The Technical Study will be made up of two teams: MRE (Malware Reverse Engineering Team) and AMTS (Anti-Malware Technology Solutions Team). MRE team will be in charge of studying the malware samples and to inoculate the techniques used against banking Websites; AMTS team will harvest the internet for any Web Infrastructural solution that claims to be Malware Proof for identifying its strengths and weaknesses.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Leader&amp;lt;br&amp;gt;[[User:Gfedon|'''Giorgio Fedon''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Contibutors&amp;lt;br&amp;gt;[[User:Vicente.aguilera|'''Vicente Aguilera''']]&amp;lt;br&amp;gt;[[User:Giuseppe_Bonfa|'''Giuseppe Bonfa''']]&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-anti-malware '''Subscribe here''']&amp;lt;br&amp;gt;[mailto:owasp-anti-malware@lists.owasp.org '''Use here''']&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
License&amp;lt;br&amp;gt;[http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Document''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Sponsors&amp;lt;br&amp;gt;[http://www.mindedsecurity.com '''Minded Security''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Projects''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Provisory '''[[:Category:OWASP Project Assessment#Alpha Quality Documentation Criteria|Apha Quality]]'''&amp;lt;br&amp;gt;(under review)&amp;lt;br&amp;gt;[[:OWASP Anti-Malware Project - Assessment Frame|Please see here for complete information.]]&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:OWASP Anti-Malware Project - Awareness Program|Anti-malware Awareness Program]]&amp;lt;br&amp;gt;[[:OWASP Anti-Malware - Knowledge Base|Anti-malware - Knowledge Base]]&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
if any, add link(s)&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123359</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123359"/>
				<updated>2012-01-27T14:54:40Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Actions to take for mitigating the Malware Attack Process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers (e.g. Plugin Update)&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised customers&lt;br /&gt;
* Have in place a security response process&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Invest in user Informative (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel authentication&lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123358</id>
		<title>OWASP Anti-Malware Project - Awareness Program</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_Project_-_Awareness_Program&amp;diff=123358"/>
				<updated>2012-01-27T14:52:39Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Actions to take for mitigating the Malware Attack Process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== What is Banking Malware ===&lt;br /&gt;
=== What is Banking Malware Awarness Program ===&lt;br /&gt;
&lt;br /&gt;
=== How Banking malware deals with Web Application Security ===&lt;br /&gt;
&lt;br /&gt;
== Banking Malware Attack Process ==&lt;br /&gt;
The process involving Malware attack require the subsequent verification of each of the following steps to be successful. We consider an attack to be successful if the attacker obtain a financial gain from the initial client attack. The very steps (e.g. Infection of clients) usually do not involve the Banking infrastrucure, while others are tightly connected to it. Attackers absolutely need the functionalities offered by the hacked online bank accounts to do cash outs.&lt;br /&gt;
&lt;br /&gt;
=== From user infection to cash out ===&lt;br /&gt;
(Image is missing) &lt;br /&gt;
&lt;br /&gt;
This is a chain of required steps. Attackers need to perform successfully each of these for turning the attack into a monetary gain. For this reason the process can be reasonably stopped at any level. As in other cases a defense in depth approach is suggested to be effective against the weakest link of each part of the attack.&lt;br /&gt;
&lt;br /&gt;
==== Infection of clients and pcs ====&lt;br /&gt;
* Exploitation of client side vulnerabilities (during internet browsing)&lt;br /&gt;
* Spam (Infection delivered via Email)&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Infection and creating the Permanent threat ====&lt;br /&gt;
* Packers&lt;br /&gt;
* Modded Builds&lt;br /&gt;
* Rootkit (and Bootkit)&lt;br /&gt;
&lt;br /&gt;
==== Stealing of Auth credentials ====&lt;br /&gt;
* KeyLogging and Form Grabbing&lt;br /&gt;
* Video Grabbing&lt;br /&gt;
* WebInjects&lt;br /&gt;
&lt;br /&gt;
==== Storing of Auth credentials ====&lt;br /&gt;
* Standard Dropzone&lt;br /&gt;
* Fast Flux Based&lt;br /&gt;
* Instant Messaging and P2P network&lt;br /&gt;
&lt;br /&gt;
==== Hiding The Operations ====&lt;br /&gt;
* Data Tunnelling&lt;br /&gt;
* Modification of Contact Details&lt;br /&gt;
* User Interface Restoring&lt;br /&gt;
&lt;br /&gt;
==== Cashing Out ====&lt;br /&gt;
* Money Transfer&lt;br /&gt;
* Mobile Phone Charge&lt;br /&gt;
* Pump and Dump&lt;br /&gt;
&lt;br /&gt;
== Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== General strategy ===&lt;br /&gt;
* Narrowing the attack surface&lt;br /&gt;
* Identification&lt;br /&gt;
* Blocking &lt;br /&gt;
* Recovering&lt;br /&gt;
&lt;br /&gt;
=== Actions to take for mitigating the Malware Attack Process ===&lt;br /&gt;
==== Containing the number of infected customers ====&lt;br /&gt;
* Awareness (e.g. Remember to the users about Antivirus programs)&lt;br /&gt;
* Check for software updates and potentially exposed customers&lt;br /&gt;
* Monitoring for Anomalies&lt;br /&gt;
&lt;br /&gt;
==== Unhide the Infection ====&lt;br /&gt;
* Tell to your customers about the infections&lt;br /&gt;
* Use systems for detecting compromised clients&lt;br /&gt;
* Have in place a security response process to assist customers&lt;br /&gt;
&lt;br /&gt;
==== Counterfeat the Stealing of Auth credentials ====&lt;br /&gt;
* Resilient Authentication&lt;br /&gt;
* Inform the user about their own operations (e.g. SMS with Token and Transaction details)&lt;br /&gt;
* Multi factor and Multi channel &lt;br /&gt;
&lt;br /&gt;
==== Against the Remote Storaging of Auth Credentials ====&lt;br /&gt;
* Identification and Alerting about Dropzones&lt;br /&gt;
* Browser Sand boxing&lt;br /&gt;
* Dropzone security response&lt;br /&gt;
&lt;br /&gt;
====  Reveal Malicious Operations ====&lt;br /&gt;
* Track transaction anomalies (Protocols, Geo Location, Bot –Like Requests)&lt;br /&gt;
* Establish a protected user informative (e.g. protecting phone numb. details update)&lt;br /&gt;
* Detect UI modification&lt;br /&gt;
&lt;br /&gt;
==== Against Cashing Out ====&lt;br /&gt;
* Mule accounts monitoring&lt;br /&gt;
* Monitor and correlate sources for any disposal operation&lt;br /&gt;
&lt;br /&gt;
== Evaluate your organization ==&lt;br /&gt;
Your organization can be evaluated along the adoption of the countereasures described above and on the effort to mitigate each malware attack step&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123357</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123357"/>
				<updated>2012-01-27T14:37:56Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: /* Behaviour Based Authentication */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
=== Password ===&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
&lt;br /&gt;
=== Behavior Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123356</id>
		<title>OWASP Anti-Malware - Knowledge Base</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Anti-Malware_-_Knowledge_Base&amp;diff=123356"/>
				<updated>2012-01-27T14:37:29Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction ==&lt;br /&gt;
=== A Technical Knowledge Base for Banking Malware Threats ===&lt;br /&gt;
&lt;br /&gt;
== Protecting Banking Resources ==&lt;br /&gt;
&lt;br /&gt;
=== Are your resources protected? ===&lt;br /&gt;
&lt;br /&gt;
=== Enumerate the interesting targets ===&lt;br /&gt;
=== Define the path to the targets (Transition graphs) ===&lt;br /&gt;
=== Apply trust boundaries (security measures) ===&lt;br /&gt;
=== Define the weaknesses of the security measures adopted ===&lt;br /&gt;
==  Appendix A: Security Considerations about Authentication Solutions and Malware ==&lt;br /&gt;
&lt;br /&gt;
=== Password ===&lt;br /&gt;
&lt;br /&gt;
=== Javascript Keyboard ===&lt;br /&gt;
&lt;br /&gt;
=== Behaviour Based Authentication ===&lt;br /&gt;
&lt;br /&gt;
=== TAN (Gridcard, Scratch Card) ===&lt;br /&gt;
&lt;br /&gt;
=== OTP (Time Based, Click Based) === &lt;br /&gt;
&lt;br /&gt;
=== CAP (Random Nonce, Challenge Response) ===&lt;br /&gt;
&lt;br /&gt;
=== SMS Challenges ===&lt;br /&gt;
&lt;br /&gt;
=== MSISDN (Caller-ID Authentication) ===&lt;br /&gt;
&lt;br /&gt;
== Appendix B: Banking Malware Families (Active in 2012) ==&lt;br /&gt;
=== Spyeye ===&lt;br /&gt;
&lt;br /&gt;
SpyEye is considered the successor of ZeuS and globally considered as &lt;br /&gt;
the most advanced Banking Malware kit actually used. &lt;br /&gt;
&lt;br /&gt;
This kit was conceived as botnet easy to manage via a web based control panel.&lt;br /&gt;
&lt;br /&gt;
SpyEye relies upon MiTB ( Man in The Browser ) attacks to accomplish &lt;br /&gt;
its task, it provides a custom Encrypted Configuration File where &lt;br /&gt;
there are:&lt;br /&gt;
&lt;br /&gt;
* '''Plugins'''&lt;br /&gt;
* '''Web Injection Code'''&lt;br /&gt;
* '''Collectors List- where stolen data is sent'''&lt;br /&gt;
&lt;br /&gt;
SpyEye is capable of HTML code injection in the following browsers:&lt;br /&gt;
&lt;br /&gt;
* '''FireFox'''&lt;br /&gt;
* '''Internet Explorer'''&lt;br /&gt;
* '''Chrome'''&lt;br /&gt;
* '''Opera'''&lt;br /&gt;
&lt;br /&gt;
List of commonly used Plugins:&lt;br /&gt;
&lt;br /&gt;
* '''ccgrabber''' - used to collect Credit Card numbers by analyzing POST requests.&lt;br /&gt;
* '''ffcertgrabber''' - used to steal Firefox stored Certificates.&lt;br /&gt;
* '''ftpbc''' - used to reverse ftp connections to the bot.&lt;br /&gt;
* '''socks5''' - allows reverse connections via a proxy server.&lt;br /&gt;
* '''billinghammer''' - charges Credit Cards by using stolen card data.&lt;br /&gt;
* '''ddos''' - plugin used to ddos a specified target.&lt;br /&gt;
* '''bugreport''' - send crash reports to the bot master.&lt;br /&gt;
* '''SpySpread''' - capability to spread via USB, IM Messages&lt;br /&gt;
* '''rdp''' - Remote Desktop capability&lt;br /&gt;
&lt;br /&gt;
SpyEye kit, actually reached version 1.3.48&lt;br /&gt;
&lt;br /&gt;
In the second half of 2011 appeared a mobile edition of SpyEye, called&lt;br /&gt;
SpitMo specifically designed to steal mTAN (mobile TAN) authentication&lt;br /&gt;
systems. [http://blogs.mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android/ SpitMo]&lt;br /&gt;
&lt;br /&gt;
Recently (Jenuary 2012) appeared a SpyEye Campaign able to [http://nakedsecurity.sophos.com/2012/01/05/spyeye-bank-trojan-hides-its-fraud-footprint/ Hide its Fraud Footprint] also called Post-Transaction Attack&lt;br /&gt;
&lt;br /&gt;
Resources:&lt;br /&gt;
&lt;br /&gt;
* [http://blog.fortinet.com/a-guide-to-spyeye-cc-messages/ A Guide to SpyEye C&amp;amp;C Messages]&lt;br /&gt;
* [http://blogs.rsa.com/rsafarl/new-spyeye-gains-zeus-features-a-detailed-analysis-of-spyeye-trojan-v1-3/ New SpyEye Gains Zeus Features – A Detailed Analysis of SpyEye Trojan v1.3]&lt;br /&gt;
* [http://cert.lexsi.com/weblog/index.php/2011/02/23/408-ddos-plugin-for-spyeye DDOS plugin for SpyEye]&lt;br /&gt;
* [http://www.prevx.com/blog/149/SpyEye-steals-your-data-Even-in-a-limited-account.html SpyEye steals your data. Even in a limited account]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-1-cn-1/ The SpyEye Interface, Part 1: CN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/the-spyeye-interface-part-2-syn-1/ The SpyEye Interface Part 2: SYN 1]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 1)]&lt;br /&gt;
* [http://blog.trendmicro.com/spyeye-1-3-4-x-comes-with-noteworthy-modifications-part-2/ SpyEye 1.3.4.x Comes with Noteworthy Modifications (Part 2)]&lt;br /&gt;
&lt;br /&gt;
=== Zeus ===&lt;br /&gt;
&lt;br /&gt;
ZeuS is a Banking Trojan identified for the first time in 2007, designed&lt;br /&gt;
as '''HTTP Based Botnet''' specifically crafted to steal Online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Despite the fact that ZeuS Kit is no longer developed, infection statistics&lt;br /&gt;
that can be checked here [https://zeustracker.abuse.ch/statistic.php ZeuS Statistics]&lt;br /&gt;
clearly demonstrates that this trojan has a remarkable diffusion.&lt;br /&gt;
&lt;br /&gt;
The ZeuS Kit functionality is based on MiTB attacks, an encrypted &lt;br /&gt;
configuration file contains URL Triggers and HTML Code to be Injected.&lt;br /&gt;
&lt;br /&gt;
In the past year appeared also a ZeuS for mobile called ZitMo, developed&lt;br /&gt;
to bypass mTAN authentication system, more information can be reached here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.kaspersky.com/about/news/virus/2011/Teamwork_How_the_ZitMo_Trojan_Bypasses_Online_Banking_Security The ZitMo Trojan Bypasses Online Banking Security]&lt;br /&gt;
* [http://www.virusbtn.com/news/2011/07_11.xml Zitmo Trojan for Android defeats two-factor authentication]&lt;br /&gt;
&lt;br /&gt;
2011 was also the year of ZeuS Source Code leak, this essentially lead to a &lt;br /&gt;
number of new ZeuS Variants, here the most significative:&lt;br /&gt;
&lt;br /&gt;
* ICE IX&lt;br /&gt;
* ZeuS P2P Edition&lt;br /&gt;
&lt;br /&gt;
The most interesting variant is the P2P one, where ZeuS gained P2P Botnet&lt;br /&gt;
and DGA (Domain Generation Algorithm) capabilities, that make ZeuS able&lt;br /&gt;
to interact with other victims (nodes) and get Updated Binaries and&lt;br /&gt;
Configurations. &lt;br /&gt;
&lt;br /&gt;
ZeuS P2P References:&lt;br /&gt;
&lt;br /&gt;
* [http://www.abuse.ch/?p=3499 ZeuS Gets More Sophisticated Using P2P Techniques]&lt;br /&gt;
* [http://www.cert.pl/news/4711/langswitch_lang/en ZeuS – P2P+DGA variant – mapping out and understanding the threat]&lt;br /&gt;
&lt;br /&gt;
Other References:&lt;br /&gt;
&lt;br /&gt;
* [https://zeustracker.abuse.ch/ ZeuS Tracker]&lt;br /&gt;
* [http://www.abuse.ch/?p=3453 Ice IX – Or Just ZeuS?]&lt;br /&gt;
* [http://www.inreverse.net/?p=1551 JaZeus: when Zeus meets Java]&lt;br /&gt;
* [http://www.coresec.org/2011/05/21/zeus-malware-analysis-by-sophoslabs/ Zeus Malware Analysis by SophosLabs]&lt;br /&gt;
* [http://www.secureworks.com/research/threats/zeus/ ZeuS Banking Trojan Report]&lt;br /&gt;
* [http://mnin.blogspot.com/2011/09/abstract-memory-analysis-zeus.html Abstract Memory Analysis: Zeus Encryption Keys]&lt;br /&gt;
&lt;br /&gt;
=== Carberp ===&lt;br /&gt;
&lt;br /&gt;
After ZeuS and SpyEye the third advanced Malware Banking Trojan is '''Carberp''', that during its evolution reached &lt;br /&gt;
a great level of complexity, by mixing good bypassing and stealth countermeasures with ability to steal via Browser &lt;br /&gt;
Code Injection online Banking Credentials.&lt;br /&gt;
&lt;br /&gt;
Synthesis of Carberp Functionalities [http://www.trustdefender.com/trustdefender-labs-blog-carberp-a-new-trojan-in-the-making.html]:&lt;br /&gt;
&lt;br /&gt;
*'''Ability to run as non-administrator'''&lt;br /&gt;
*'''Ability to infect Windows XP , Windows Vista and Windows 7'''&lt;br /&gt;
*'''Will not make any changes to the registry (only in memory modifications)'''&lt;br /&gt;
*'''Browser Hooking'''&lt;br /&gt;
*'''Stolen data is transmitted in real-time to C&amp;amp;C server'''&lt;br /&gt;
*'''Kill AntiVirus Software'''&lt;br /&gt;
*'''Screenshot Ability'''&lt;br /&gt;
*'''Form Grabber'''&lt;br /&gt;
*'''Backconnect'''&lt;br /&gt;
&lt;br /&gt;
Carberp makes use of encrypted Configuration Files that contains plugins and web injection code&lt;br /&gt;
&lt;br /&gt;
*'''miniav.psd''' - Kill Competitors Botnets (SpyEye. ZeuS)&lt;br /&gt;
*'''vnc.psd''' - Remote VNC Session Capability&lt;br /&gt;
*'''passw.psd''' - password grabber for FTP, VNC, E-Mail Clients, Stored Browser Passwords&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* www.malwareint.com/docs/inside-carberp-botnet-en.pdf&lt;br /&gt;
* [http://blog.eset.com/2011/12/04/carberp-blackhole-growing-fraud-incidents Carberp + BlackHole growing fraud incidents]&lt;br /&gt;
* [http://blog.eset.com/2011/11/21/evolution-of-win32carberp-going-deeper Bootkit Evolution of Win32Carberp: going deeper]&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/07/decrypting-carberp-c-communication.html Decrypting Carberp C&amp;amp;C communication ]&lt;br /&gt;
&lt;br /&gt;
=== Tatanga ===&lt;br /&gt;
&lt;br /&gt;
Tatanga appeared in the first half of 2011 as MiTB based trojan designed to steal Online Banking Credentials and spoof&lt;br /&gt;
(Post Transaction Attack) the real balance of the victim.&lt;br /&gt;
&lt;br /&gt;
Like previously seen trojans, also Tatanga makes use of Encrypted Configuration Files (3-DES) to store plugins and&lt;br /&gt;
web injection code.&lt;br /&gt;
&lt;br /&gt;
Additionally Tatanga is able to:&lt;br /&gt;
&lt;br /&gt;
*'''Grab E-Mail addresses'''&lt;br /&gt;
*'''Remove Competitors Botnets'''&lt;br /&gt;
*'''File Infector to increase malware spread'''&lt;br /&gt;
*'''Kill Antivirus Software'''&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
&lt;br /&gt;
* [http://securityblog.s21sec.com/2011/02/tatanga-new-banking-trojan-with-mitb.html 2011 Tatanga: a new banking trojan with MitB functions]&lt;br /&gt;
* [http://blog.trendmicro.com/more-on-the-tatanga-banking-trojan/ More on the Tatanga Banking Trojan]&lt;br /&gt;
&lt;br /&gt;
=== Urlzone ===&lt;br /&gt;
&lt;br /&gt;
== Appendix C: Server Side Security Solutions ==&lt;br /&gt;
== Appendix D: Client Side Security Solutions ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=122307</id>
		<title>Project Information:template Anti-Malware Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Anti-Malware_Project&amp;diff=122307"/>
				<updated>2012-01-05T08:45:58Z</updated>
		
		<summary type="html">&lt;p&gt;Gfedon: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT INFORMATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Anti-Malware Project'''&amp;lt;br&amp;gt;Defending Web Infrastructures Against Malware&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;7&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
“Malware is nowadays more than a single enemy: online crime has unified the forces for targeting any online banking customer. Banking Malware is ubiquitous because it’s constantly updated via country-specific configuration files and with modular plugins to fit any banking web application. In addition it can defeat the most sophisticated security protections actually implemented.”&lt;br /&gt;
&lt;br /&gt;
This project is about describing common flaws in security designs that have been adopted for protecting banking websites against malware, as well as a series of best practices that should be considered for evaluating and building better anti-malware solutions.&lt;br /&gt;
The project will be constantly updated with information taken from Owasp Community, Malware Analysis, Forensic Activities, as well as from any other validated source.&lt;br /&gt;
&lt;br /&gt;
The project delivery will be divided into Two parts. The first part will be a document containing guidelines directed to Banking Web Infrastructures owners. This document will be kept intentionally as short as possible and will have the main goal to raise the awareness on Malware threats and to precisely name a series of checklists that should be taken into consideration to significantly improve website security against malware.&lt;br /&gt;
&lt;br /&gt;
The second part will be a technical study dynamically updated in wiki-style format. The technical study will be the reference for the guidelines contained in the previous document. This study will try to analyze the most sophisticated Malware Techniques used in the 3 most spread Banking Malware families, as well as discuss the effectiveness of different security protections that are thought to be useful against Malware.&lt;br /&gt;
&lt;br /&gt;
The Technical Study will be made up of two teams: MRE (Malware Reverse Engineering Team) and AMTS (Anti-Malware Technology Solutions Team). MRE team will be in charge of studying the malware samples and to inoculate the techniques used against banking Websites; AMTS team will harvest the internet for any Web Infrastructural solution that claims to be Malware Proof for identifying its strengths and weaknesses.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
'''Key Project Information'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Leader&amp;lt;br&amp;gt;[[User:Gfedon|'''Giorgio Fedon''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Contibutors&amp;lt;br&amp;gt;[[User:Vicente.aguilera|'''Vicente Aguilera''']]&amp;lt;br&amp;gt;'''Giuseppe Bonfa'''&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Mailing List&amp;lt;br&amp;gt;[https://lists.owasp.org/mailman/listinfo/owasp-anti-malware '''Subscribe here''']&amp;lt;br&amp;gt;[mailto:owasp-anti-malware@lists.owasp.org '''Use here''']&lt;br /&gt;
 | style=&amp;quot;width:17%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
License&amp;lt;br&amp;gt;[http://creativecommons.org/licenses/by-sa/3.0/ '''Creative Commons Attribution Share Alike 3.0''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Project Type&amp;lt;br&amp;gt;[[:Category:OWASP_Project#Alpha_Status_Projects|'''Document''']]&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Sponsors&amp;lt;br&amp;gt;[http://www.mindedsecurity.com '''Minded Security''']&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Release Status''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Main Links'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Related Projects''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
Provisory '''[[:Category:OWASP Project Assessment#Alpha Quality Documentation Criteria|Apha Quality]]'''&amp;lt;br&amp;gt;(under review)&amp;lt;br&amp;gt;[[:OWASP Anti-Malware Project - Assessment Frame|Please see here for complete information.]]&lt;br /&gt;
 | style=&amp;quot;width:42%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:OWASP Anti-Malware Project - Awareness Program|Anti-malware Awareness Program]]&amp;lt;br&amp;gt;[[:OWASP Anti-Malware - Knowledge Base|Anti-malware - Knowledge Base]]&lt;br /&gt;
 | style=&amp;quot;width:29%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
if any, add link(s)&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Gfedon</name></author>	</entry>

	</feed>