[<prev] [next>] [day] [month] [year] [list]
Message-ID: <200411060945.25991.jstewart@lurhq.com>
From: jstewart at lurhq.com (Joe Stewart)
Subject: Win32.Grams - E-Gold Account Siphoner
I've written up an analysis of the Win32.Grams trojan. It differs from
previous E-Gold phishing trojans in that it doesn't steal credentials; it
uses the victim's own browser to siphon all the E-Gold (well, almost all, it
leaves them .004 grams) directly from their account to another E-Gold
account, using OLE automation. This would completely bypass all the new
authentication methods financial institutions are using to thwart keystroke
loggers/password stealers, because the trojan simply lets the user do the
authentication, then takes over from there.
Full analysis is here:
http://www.lurhq.com/grams.html
-Joe
--
Joe Stewart, GCIH
Senior Security Researcher
LURHQ http://www.lurhq.com/
Powered by blists - more mailing lists