VB2014 preview: P0wned by a barcode

Posted by   Virus Bulletin on   Aug 13, 2014

Fabio Assolini to speak about malware targeting boletos.

In the weeks running up to VB2014, we will look at some of the research that will be presented at the conference. In the first of this series, we look at the paper 'P0wned by a barcode: stealing money from offline users', from Kaspersky researcher Fabio Assolini.

Cybercrime is a global phenomenon. In fact, it is its very global nature that makes it so hard to fight, as cybercriminals can easily hide behind proxies and legislations to stay out of the hands of law enforcement.

But this doesn't mean that cybercrime doesn't take local or regional forms. Those outside Brazil will probably not have heard of the 'Boleto bancáo' ('boleto' for short), a very popular payment method in the Latin American country. Unsurprisingly, online crooks have discovered this too.

Boletos can be paid at ATMs, as well as at banks and in many shops. Each boleto is uniquely identified by a barcode printed on it - it is this barcode that makes sure the funds go to the intended recipient. This way, bills and even online shopping can be paid for without the need of a credit card or even a bank account.


  Real boleto. The ID field can be manually entered in case the barcode cannot be scanned.

Of course, if you somehow ended up printing an incorrect barcode, the funds would go somewhere else - which is exactly what criminals have discovered. In his paper, Fabio looks at how malware is used to intercept and modify boletos as they are downloaded from the Internet. The barcode and its ID number are changed to point to an account owned or controlled by the criminals, and when the boleto is paid, the funds end up in their hands.

Other researchers have also recently looked at the underground economy's interest in boletos. Last month, security firm RSA claimed that through malware targeting boletos, crooks have netted the equivalent of billions of dollars in the past two years - though others have disputed that figure.


  Boleto modified by malware: both the barcode and the ID field have been modified.

Malware targeting boletos continues to evolve. In a post on Kaspersky's Securelist blog, Fabio looks at the use of encrypted malware payloads XOR'ed with a 32-bit key and compressed using the ZLIB algorithm. This is a technique previously used by the GameOver Zeus botnet, and Fabio says he has evidence that Brazilian criminals are working together with European gangs.

To see a taster of Fabio's presentation and to get an idea of the Brazilian online underground, here is the video Fabio's VB2013 paper on malicious PAC files.

You can now register for VB2014. And if you have some research that you want to share with the security community, why not submit an abstract to fill one of the seven remaining 'last-minute' presentation slots?

Posted on 13 August 2014 by Martijn Grooten

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

Analysis of malware responsible for sextortion spam that mines for Monero on the side

VB2019 Platinum partner Reason Cybersecurity presents a threat analysis report on the Save Yourself malware.

Guest blog: Threat intelligence – a unifying force of the future

In a guest blog post VB2019 Platinum partner Reason Cybersecurity looks to the future of threat intelligence.

Guest blog: Why we should be paying more attention to Linux threats

In a guest blog post VB2019 Silver partner Intezer outlines the importance of paying attention to Linux threats.

New Emotet spam campaign continues to bypass email security products

On Monday, the infamous Emotet malware resumed its spam campaign to spread the latest version of the malware. As before, the malware successfully bypasses many email security products.

Book review: Cyberdanger: Understanding and Guarding Against Cybercrime

Security researcher Paul Baccas reviews Eddy Willems' book 'Cyberdanger'.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.