{"id":15100,"date":"2015-09-18T15:23:56","date_gmt":"2015-09-18T15:23:56","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=4539"},"modified":"2020-02-26T18:55:56","modified_gmt":"2020-02-26T16:55:56","slug":"carbanak-evolved-new-versions-are-detected","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.za\/blog\/carbanak-evolved-new-versions-are-detected\/15100\/","title":{"rendered":"Carbanak evolved: new versions are detected"},"content":{"rendered":"<p>New variants of \u00a0the \u201clegendary\u201d banking Trojan Carbanak are making the rounds on\u00a0the Web, so far noticed in Europe and the United States. Now it has a \u201cproprietary communications protocol\u201d, and the samples seen so far have been digitally signed, Threatpost <a href=\"https:\/\/threatpost.com\/new-versions-of-carbanak-banking-malware-seen-hitting-targets-in-u-s-and-europe\/114522\/\" target=\"_blank\" rel=\"noopener nofollow\">reported <\/a>earlier this month.<\/p>\n<p><strong>Great robbery<\/strong><\/p>\n<p>Upon\u00a0its discovery earlier this year, Carbanak had been dubbed the first ever purely criminal APT. It was (and is) an ultra-massive money-stealing campaign directly targeting banks. Total losses amounted to $1 billion in February. And if we assume that the campaign is still active, the losses may be considerably larger.<\/p>\n<p>By far it is the most successful criminal cyber campaign we have seen.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Carbanak evolved: new versions are detected #CarbanakAPT<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FyG4g&amp;text=Carbanak+evolved%3A+new+versions+are+detected+%23CarbanakAPT\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Detailed descriptions of the campaign are available <a href=\"https:\/\/business.kaspersky.com\/the-great-bank-robbery-carbanak-apt\/3598\/\" target=\"_blank\" rel=\"noopener nofollow\">in our February post<\/a> and on <a href=\"https:\/\/securelist.com\/blog\/research\/68732\/the-great-bank-robbery-the-carbanak-apt\/\" target=\"_blank\" rel=\"noopener\">Securelist<\/a>. For now, we\u2019ve updated a couple of details:<\/p>\n<p>1. Carbanak targets banks directly; bank workers are \u201cserved\u201d with phishing emails, consequently a backdoor is installed; attackers then search for \u201crelevant\u201d computers, such as those of administrators, to compromise and extract money.<\/p>\n<p>2. Manual action is also present. Attackers explored the banks infrastructure; employed \u201cmoney mules\u201d to collect cash from the compromised ATMs (mules weren\u2019t required to interact with the ATMs themselves, just to come at the right time).<\/p>\n<p>All in all, according to Sergey Golovanov, Principal Security Researcher at Kaspersky Lab\u2019s Global Research and Analysis Team, \u201cThe attackers didn\u2019t even need to hack into the banks\u2019 services: once they got into the network, they learned how to hide their malicious plot behind legitimate actions. It was a very slick and professional cyber-robbery\u201d.<\/p>\n<p><strong>New menace<\/strong><\/p>\n<p>New versions of Carbanak, discovered recently, are said to have some unique characteristics. The malware injects itself into the svchost.exe process as a way to hide itself; however the folder in which Carbanak installs itself and the filename it uses are both static.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>#CarbanakAPT\u00a0is the most successful criminal cyber campaign we have seen. No surprises, it evolves.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2FyG4g&amp;text=%23CarbanakAPT%C2%A0is+the+most+successful+criminal+cyber+campaign+we+have+seen.+No+surprises%2C+it+evolves.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Carbanak also utilizes plugins, those are installed via Carbanak\u2019s own protocol. They are then communicated with a hardcoded IP address.<\/p>\n<p>The isolated signatures were issued from Comodo to a company in Moscow, Russia.<\/p>\n<p><strong>A proprietary protocol?<\/strong><\/p>\n<p>Carbanak\u2019s own communication protocol is a head-turner, but it\u2019s well in line with the current trends of malware development. Everything that works evolves further. And Carbanak definitely worked well enough to keep it in active development.<\/p>\n<p>A few general safety recommendations:<\/p>\n<ul>\n<li>Do not open suspicious emails, especially if they have an attachment;<\/li>\n<li>Update your software regularly in order to avoid falling prey to exploits for already-fixed vulnerabilities.<\/li>\n<\/ul>\n<p>All Kaspersky Lab\u2019s corporate products and solutions detect and block known Carbanak samples.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New variants of  the &#8220;legendary&#8221; banking Trojan Carbanak are making the rounds on the Web, so far noticed in Europe and the United States.<\/p>\n","protected":false},"author":209,"featured_media":15526,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3021],"tags":[734,963,282],"class_list":{"0":"post-15100","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-banking-trojans","10":"tag-carbanak","11":"tag-cybersecurity"},"hreflang":[{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/carbanak-evolved-new-versions-are-detected\/15100\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/carbanak-evolved-new-versions-are-detected\/15100\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/carbanak-evolved-new-versions-are-detected\/15100\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.za\/blog\/tag\/banking-trojans\/","name":"banking trojans"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15100","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/users\/209"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/comments?post=15100"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15100\/revisions"}],"predecessor-version":[{"id":26583,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/posts\/15100\/revisions\/26583"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media\/15526"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/media?parent=15100"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/categories?post=15100"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.za\/blog\/wp-json\/wp\/v2\/tags?post=15100"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}