Keylogging Trojan uses unique attack
Deutsche Bank trials show effectiveness of unhelpful browser helper object at stealing data
An alert has been issued for a new Trojan that uses a unique method of sneaking past network administrators and corporate firewalls.
The Trojan arrives as an attachment and pretends to be an Internet Explorer Browser Helper Object (BHO). It includes keylogging software that is activated when the user visits certain web sites, typically banking and login in screens.
What makes this Trojan unique is the method it uses to send this information back. Traditionally keyloggers send back recorded information as email or HTTP POST but increasingly these types of transmissions are being watched for by security software.
Instead the Trojan encrypts its data using a XOR algorithm and then builds an Internet Control Message Protocol (ICMP) ping packet, which looks like legitimate network traffic. Internet Control Message Protocol (ICMP) ping packets are typically used to check connection speeds and deliver error messages.
"The method of network transport used by the attacker makes this Trojan unique," said internet monitoring company Websense in its alert.
"To network administrators and egress filters, this ICMP packet looks like legitimate traffic leaving the network. The attackers presumably capture this packet at their remote server, where the packet is easily decoded to reveal the information entered by the user."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
-
What does modern security success look like for financial services?Sponsored As financial institutions grapple with evolving cyber threats, intensifying regulations, and the limitations of ageing IT infrastructure, the need for a resilient and forward-thinking security strategy has never been greater
-
Yes, legal AI. But what can you actually do with it? Let’s take a look…Sponsored Legal AI is a knowledge multiplier that can accelerate research, sharpen insights, and organize information, provided legal teams have confidence in its transparent and auditable application