Menu
Hybrid GozNym malware targets customers of 24 financial institutions

Hybrid GozNym malware targets customers of 24 financial institutions

GozNym combines Nymaim and Gozi Trojans to hit US, Canadian financial institutions

A group of cybercriminals have combined two powerful malware programs to create a new online banking Trojan that has already stolen millions of dollars from customers of 24 US and Canadian banks.

The new threat has been dubbed GozNym by researchers from IBM X-Force because it combines the stealthy Nymaim malware and the Gozi banking Trojan.

The new computer Trojan targets 22 websites that belong to banks, credit unions and e-commerce platforms based in the US, and two that belong to financial institutions from Canada. Business banking services appear to be a top target for GozNym's creators, according to the IBM researchers.

Nymaim is what researchers call a dropper. Its purpose is to download and run other malware programs on infected computers. It is usually distributed through Web-based exploits launched from compromised websites.

Nymaim uses detection evasion techniques such as encryption, anti-VM and anti-debugging routines, and control flow obfuscation. In the past, it has primarily been used to install ransomware on computers.

However, since November, the cybercriminal gang that controls Nymaim has switched to banking fraud. Specifically, the dropper started loading a DLL that is part of the Gozi ISFB malware and which is capable of injecting malicious code into Web browsing sessions. This technique is most frequently used to perform online banking fraud.

The integration between Nymaim and Gozi became complete in April, when a new version was discovered that combined code from both threats in a single new Trojan - GozNym.

"This malware is as stealthy and persistent as the Nymaim loader while possessing the Gozi ISFB Trojan’s ability to manipulate Web sessions, resulting in advanced online banking fraud attacks," the IBM X-Force researchers said in a blog post.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags securitycybercriminalsransomwaremalwareHybrid GozNym

Featured

Slideshows

Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Examining the changing job scene in the Kiwi channel

Examining the changing job scene in the Kiwi channel

Typically, the New Year brings new opportunities for personnel within the Kiwi channel. 2017 started no differently, with a host of appointments, departures and reshuffles across vendor, distributor and reseller businesses. As a result, the job scene across New Zealand has changed - here’s a run down of who is working where in the year ahead…

Examining the changing job scene in the Kiwi channel
Show Comments