Kaspersky Lab researchers have detected new malware designed to steal the credentials of online banking customers. Earlier versions of the new malware, called NukeBot, were known to the security industry as TinyNuke, but lacked the features necessary to launch attacks. The latest versions however, are fully operable, and contain code to target the users of specific banks.
Although the appearance of a malware family in the wild is not unusual, the fact that criminals have a ready-to-attack version of the Trojan, means that soon they may initiate a wide-scale malicious campaign, to infect multiple users, Kaspersky claims. As an early warning to its customers and other users, Kaspersky Lab has published a brief analysis of the malware.
NukeBot is a "banking Trojan". Upon infection it "injects" malicious code into the webpage of an online banking service displayed in a victim's browser and then steals user data, spoofs their credentials, and more. According to Kaspersky Lab researchers, there are already a number of compiled samples of this Trojan in the wild - shared on underground hacking forums. Most of these are rough, barely operational malware drafts; however, the company's experts have managed to identify some that pose a real threat.
Around 5% of all samples found by Kaspersky Lab were NukeBot's new 'combat versions', which have improved source codes and attacking capacities. Among other things these versions contain injections - specific pieces of code, which mimic parts of user interface of real online banking services. Based on the analysis of injections, Kaspersky Lab experts believe the main targets of the new version of NukeBot are users of several French and US banks.
In addition, Kaspersky Lab researchers managed to detect several NukeBot modifications that didn't have web injection functionality, and were designed to steal mail client and browser passwords. This means that developers of new versions may aim to widen the functionality of this malware family.
"While criminals behind recent versions of this malware currently are not actively distributing NukeBot, this may, and likely will, change very soon. We've already seen this before with some other malware families: after a short testing period of a ready-to-attack malware, criminals start distributing it widely through infected websites, spam and phishing," said Sergey Yunakovsky, security expert at Kaspersky Lab.
"So far we have seen NukeBot versions which are ready to attack the customers of at least six banks located in France and the US, however this list of targets looks like only the beginning," Sergey added. "The goal of our brief research is to warn the banking community and online banking customers about a potentially emerging threat. We urge interested parties to use the results of our research in order to protect themselves from this threat in advance."