How does the recently discovered OddJob Trojan differ from previous banking Trojans, such as Zeus? Are there particular technological protections we can put in place to prevent infection?
The most nefarious new feature the OddJob Trojan brings onto the malware landscape is that it keeps Web browser sessions open after users think they have logged out of targeted websites. There are few technical details, but Symantec Corp. does have a write-up in which it outlines the technical details and also specifies best practices users should follow to protect themselves.
When it comes to online security, banking Trojan OddJob differs from the Zeus banking Trojan minimally in its end goal of stealing money from victims, but some of the technical details do differ. The two greatest differences between OddJob and Zeus are the maturity of Zeus and the real-time nature of OddJob. Zeus has been around for a long time compared to the average lifespan of a malware family, and OddJob has just emerged in the last few months. Zeus also has mature functionality for building and managing the malware that is extended as new attacks are developed. OddJob differs from Zeus by operating in real-time, allowing the attacker to continue to use a Web browser session from an infected client to steal money, rather than stealing credentials for later use, as Zeus does. The protections in both cases are the same basic best practices since the most important step is to prevent OddJob (or Zeus) from first getting installed on a system in the first place.
Dig deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis, Enterprise Threats
A new variant of Java-based malware can execute regardless of the operating system used. Nick Lewis explains how to limit the threat.continue reading
A variant of malware on Android devices removes and reinstalls itself when a device powers on or off. Learn how to completely eradicate the threat.continue reading
Expert Nick Lewis explains how to avoid a detrimental VPN bypass flaw that allows malicious apps to infiltrate Android devices.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.