VB2014 paper: The evolution of webinjects

Posted by   Virus Bulletin on   Oct 13, 2014

Jean-Ian Boutin looks at the increased commoditization of webinjects.

Virus Bulletin has always been about sharing information, and the Virus Bulletin conference is an important part of that. We would love to be able to share some of the discussions attendees had during the lunch and coffee breaks, the late-night or early-morning meetings in the hotel lobby, and the inspiration one gets from being around such bright minds.

Of course, we are unable to do that. But what we can do is share some of the technical content presented during VB2014. Over the next months, we will be sharing conference papers as well as video recordings of the presentations. We start off this series with the paper "The evolution of webinjects" by ESET researcher Jean-Ian Boutin.

Webinjects, where the trojan modifies the content of a targeted website on the fly before displaying it in the browser, have become ubiquitous in today's banking trojans. They are used for a wide range of malicious activities to aid financial fraud, from phishing for credentials to bypassing two-factor authentication.

  Content removal using a webinject. In the bottom page, the security warnings are removed.

In his paper, Jean-Ian looks at how webinjects have evolved over time. Banks are constantly improving the security of their online systems, and the use of webinjects is one way in which malware authors are trying to keep up. In many of today's banking trojans, webinjects are the core of the attack code.

In line with a general trend in cybercrime, webinjects have become increasingly commoditized. As a consequence, most modern banking trojans are now using the same format for the webinject configuration file.

Malicious actors, many of whom have ties with traditional organized crime groups, sell such configuration files on underground forums, allowing crooks operating banking malware to target many financial institutions without having to reverse engineer the format used for online transactions by each individual institution.

  Standard webinject configuration file format.

You can read Jean-Ian's paper here in HTML-format, or download it here as a PDF (no registration or subscription required). You can download the presentation slides here. We have also uploaded the presentation to our YouTube channel.



Posted on 13 October 2014 by Martijn Grooten
twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

Necurs pump-and-dump spam campaign pushes obscure cryptocurrency

A Necurs pump-and-dump spam campaign pushing the lesser known Swisscoin botnet is mostly background noise for the Internet.

Alleged author of creepy FruitFly macOS malware arrested

A 28-year old man from Ohio has been arrested on suspicion of having created the mysterious FruitFly malware that targeted macOS and used it to spy on its victims.

The threat and security product landscape in 2017

At the start of the new year, Virus Bulletin looks back at the threats seen in the 2017 and at the security products that are available to help mitigate them.

Spamhaus report shows many botnet controllers look a lot like legitimate servers

Spamhaus's annual report on botnet activity shows that botherders tend to use popular, legitimate hosting providers, domain registrars and top-level domains when setting up command-and-control servers.

Tips on researching tech support scams

As tech support scammers continue to target the computer illiterate through cold calling, VB's Martijn Grooten uses his own experience to share some advice on how to investigate such scams.