Tuesday, 7 July 2015

Building Kit Of Malware That Dutch Banks Attacked Leaked



Researchers have found the kit on the Internet the malware was used in the past to attack Dutch banks. It is the KINS malware, which stands for "Kasper Internet Security Non ', a reference to an eponymous product of anti-virus firm Kaspersky Lab.

It is called a banking Trojan data for Internet banking attempting to steal, to subsequently join defraud. In addition, the malware can also steal passwords for different websites. In late June showed that of the 2.0 KINS "builder" and source code of the control was leaked, so discovered several researchers, including those from Malware Must Die! . They decided after internal consultation to make the discovery public, because they were mostly "bad guys" who knew of it, instead of the "good guys". So the malware can now be downloaded from various websites.

The researchers note that the source code of the malware itself is not leaked. It is the source of the control which information about infected computers can be collected and viewed. Through the "builder" which is also available online can through a few mouse clicks new instances of malware are generated and that can be a big problem, so they claim.

"This is very important information for the security community. The archive will be distributed on a large scale," the researchers said. They also ask others for help in countering the spread of the malware kit. KINS in 2013 was presented as a new digital bank robber. From examination of the Delft security company Fox-IT found that the Trojan horse in the source code of the notorious Zeus banking Trojan was founded and since 2011 it was used to attack banks, especially in Germany and the Netherlands.

No comments:

Post a Comment