PRO+ Premium Content/Information Security magazine
Access your Pro+ Content below.
The banking malware scourge

This article is part of the Information Security magazine issue of May 2010
At first, it was hard to tell what was causing the "phantom" money transfers from the online bank account of a small North Carolina company. Investigators didn't know if the fraudulent wire and Automated Clearing House transfers were caused by an insider or malware, recalls Don Jackson, director of threat intelligence with the Counter Threat Unit at SecureWorks, an Atlanta-based security services provider. But the cause became quite clear when Jackson and his team examined the bookkeeper's computer: an infection by the Zeus Trojan. "In the past, Zeus was just spyware and wanted user names and passwords," he says. "This was the first banking version of Zeus. It got into the browser and changed things on the fly." The malware caused the business to lose nearly $98,000, Jackson says. That was in late 2007. Today, criminals are using the Zeus crimeware kit with astonishing success, pulling off six-figure heists from the online bank accounts of scores of small businesses, municipalities and nonprofits. The Federal Deposit Insurance ...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Features in this issue
-
Database activity monitoring keeps watch over your data
Database activity monitoring can help with security and compliance by tracking everything going on in the database.
-
Microsoft Windows 7 security features
Microsoft Windows 7 security aims to improve security without the headaches of Vista.
-
The banking malware scourge
Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.
Columns in this issue
-
Four steps toward a plan for a career in information security
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.
-
The real information security risk equation
A simplified information security risk equation helps translate information security risk to users.