How does the recently discovered OddJob Trojan differ from previous banking Trojans, such as Zeus? Are there particular technological protections we can put in place to prevent infection?
The most nefarious new feature the OddJob Trojan brings onto the malware landscape is that it keeps Web browser sessions open after users think they have logged out of targeted websites. There are few technical details, but Symantec Corp. does have a write-up in which it outlines the technical details and also specifies best practices users should follow to protect themselves.
When it comes to online security, banking Trojan OddJob differs from the Zeus banking Trojan minimally in its end goal of stealing money from victims, but some of the technical details do differ. The two greatest differences between OddJob and Zeus are the maturity of Zeus and the real-time nature of OddJob. Zeus has been around for a long time compared to the average lifespan of a malware family, and OddJob has just emerged in the last few months. Zeus also has mature functionality for building and managing the malware that is extended as new attacks are developed. OddJob differs from Zeus by operating in real-time, allowing the attacker to continue to use a Web browser session from an infected client to steal money, rather than stealing credentials for later use, as Zeus does. The protections in both cases are the same basic best practices since the most important step is to prevent OddJob (or Zeus) from first getting installed on a system in the first place.
Dig deeper on Malware, Viruses, Trojans and Spyware
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.