Shylock bank Trojan upgraded with new capabilities, says Symantec

Shylock bank Trojan upgraded with new capabilities, says Symantec

"All that glitters is not gold"

Article comments

The prodigious Shylock man-in-the-browser (MitB) banking Trojan is still being upgraded as part of a campaign to migrate from its traditional targets in UK financial services to foreign ones, Symantec has reported.

Malware platforms are constantly evolving but the new Shylock modules wouldn't sound out of place on a high-end commercial software product.

These include a new DiskSpread utility that allows the Trojan to infect external and USB drives, a plug-in for scraping FTP and other passwords, and something called 'BackSocks' which turns the compromised PC into a proxy server.

Other features include Archiver, a utility for compressing video files so they can be more easily uploaded to a remote server, and a 'VNC' facility to give criminals a remote connection to the victim's computer.

There is even MsgSpread, an add-on that gives Shylock a way of spreading itself using Skype connections, a feature that was first noticed in January.

Shylock can also load balance, shifting incoming traffic from victims from server to server as demand dictates.

What is unusual about Shylock is the extent to which it has favoured attacking a wide range of UK banks since appearing in late 2011. That might or might not explain why every revision of its binaries adds more fragments from the Merchant of Venice - or this could just be a simple way of changing its file signature.

Importantly, from roughly last October onwards it started diversifying its aim towards Italy and the US so the national focus could just be a means of exhausting one set of institutions before moving on to less protected targets.

"As some financial institutions become less desirable as targets, either due to increased security measures or a lack of high-value business accounts, Shylock is refocusing its attacks on those offering potentially larger returns," said Symantec.


Send to a friend

Email this article to a friend or colleague:

PLEASE NOTE: Your name is used only to let the recipient know who sent the story, and in case of transmission error. Both your name and the recipient's name and address will not be used for any other purpose.

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
* *