Menu
'Tiny banker' malware targets US financial institutions

'Tiny banker' malware targets US financial institutions

Its source code was leaked in July, which may have broadened its use among cybercriminals

A small but powerful banking trojan called Tiny Banker is equipped to attack a new range of online banking websites, several of which are in the U.S.

A small but powerful banking trojan called Tiny Banker is equipped to attack a new range of online banking websites, several of which are in the U.S.

A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.

Tiny Banker, also known as Tinba, was discovered around mid-2012 after it infected thousands of computers in Turkey.

The malware is just 20K in size and can inject HTML fields into websites when it detects a user has navigated to a banking site, asking for a range of sensitive information banks would never request during an online session.

A version analyzed by Avast showed Tiny Banker has been customized to target many new financial institutions, many of which are based in the U.S. such as Wells Fargo, Bank of America and Chase, wrote Jaromir Horejsi, an Avast malware analyst.

A screenshot bearing Wells Fargo's logo showed how Tiny Banker asks for more information when a person logs into their account. It shows a bogus warning about a system update, asking users to provider more information to verify their identity.

The requested information includes a card number, expiration date, the three digit security code on the back of a card, a person's address, Social Security number, date of birth, mother's maiden name and driver's license number and its expiration.

Tiny Banker has now been seen distributed by the Rig exploit kit, Horejsi wrote. Exploit kits are packages of software planted on websites that attack visitors' computers, looking for software vulnerabilities and delivering malware if one is found.

The revisions to Tiny Banker comes after its source code was leaked in early July, which may have seen it embraced by cybercriminals who could use it without paying for it, as many such programs are sold.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securityAvastdata protectionmalware

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments