狠狠撸

狠狠撸Share a Scribd company logo
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%1%
ONE$SHOT$EIGHT$BANK!$
ABSTRACT$
Another% compromised% hostname% “https://xxx.com”% is% acting% like% drop?zone% for% stolen% data% from% eight%
different% Italian% banks.% The% analysis% of% this% drop?zone% reveal% a% custom% web% application% focused% for% info%
stealing.%They%steal%a%credit%card%details%from%the%infected%users%using%a%phishing%attack.%%
%
SERVER$INFO$
The%server%used%like%C&C%center%to%control%the%“bots”%is%located%in%Russia%with%following%info.%
? Domain:%https://xxx.com%
? Url:%https://xxx.com/xxx/index%
? IP%Address:%5.XX.XX.XXX%
? IP'Location:%Netherland%
? Associated'mail:%sxxxxxxxx@gmail.com%
? Reverse'DNS:%XXX%
? IP'Blacklist'Check:%%
? ASN:%ASXXXX7%
%
%
Figure'1:'Network'details'
%
%
Figure'2:'IP'Geolocation'
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%2%
C&C$CENTER$FUNCTION$DETAILS$
Behind%the%password%protected%front?end%we%reveal%a%custom?made%web%application%specially%designed%to%
store%the%Credit%Card%numbers%encrypted.%
! The%first%page%shows%a%page%built%whit%a%JQuery%plugin%to%create%AJAX%based%CRUD%tables,%where,%on%
the%left%side%there%is%the%list%of%all%the%targeted%banks%and%on%the%right%side%we%have%a%list%of%all%stolen%
accounts%sent%by%the%malware%to%this%drop?zone.%%
%
Figure'4:'C&C'control'panel'
All%saved%data%are%encrypted%through%a%block%cypher%algorithm%(AES).%Selecting%the%row%you%can%see%all%the%
encrypted%data%sent%by%the%malware.%Without%the%right%decryption%key%is%impossible%to%read%them.%Here%a%
sample.%% %
%
%
% %
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%3%
During%the%static%JavaScript%code%analysis%we%found%the%code%to%encrypt%and%decrypt%“key”%used%by%hackers.%
This%two%functions%use%two%methods%declared%in%the%same%file%called%“encipher”%and%“decipher”%that%realize%
the%encryption/decryption%operation.%
%
%
1. playbovich["prototype"]["encrypt"] = function(collection) {
2.
3.collection = this["escape"](collection);
4. /** @type {number} */
5. var resp = 0;
6. for (;resp < collection["length"] % 16;resp++) {
7. collection += "0";
8. }
9. /** @type {string} */
10. var optsData = "";
11. /** @type {number} */
12. resp = 0;
13. for (;resp < collection["length"];resp += 16) {
14. this["xr_par"] = this["wordunescape"](collection["substr"](resp, 8));
15. this["xl_par"] = this["wordunescape"](collection["substr"](resp + 8, 8));
16. this["encipher"]();
17. optsData += this["wordescape"](this["xr_par"]) +
this["wordescape"](this["xl_par"]);
18. }
19. return optsData;
};! '
Figure'3:'Encryption'Code'
%
1. playbovich["prototype"]["decrypt"] = function(collection) {
2. collection = collection["toUpperCase"]();
3. /** @type {number} */
4. var resp = 0;
5. for (;resp < collection["length"] % 16;resp++) {
6. collection += "0";
7. }
8. /** @type {string} */
9. var later = "";
10. /** @type {number} */
11. resp = 0;
12. for (;resp < collection["length"];resp += 16) {
13. this["xr_par"] = this["wordunescape"](collection["substr"](resp, 8));
14. this["xl_par"] = this["wordunescape"](collection["substr"](resp + 8, 8));
15. this["decipher"]();
16. later += this["wordescape"](this["xr_par"]) +
this["wordescape"](this["xl_par"]);
17. }
18. return this["unescape"](later);
};!
%
Figure'4:'Decryption'Code'
%
%
%
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%4%
To%understand%what%kind%of%data%the%hackers%steal,%we%decoded%all%the%client%side%code%in%the%page.%In%one%
of%this%we%found%the%key%used%to%perform%the%encryption.%%
var%key%=%%
"b2feba4ede38f4e8f71cf61e1672b37366b6b932ec699ed3a3b5d1e73849e11eda88728240e1d54d074a4c48e2f8baeb
8db47b1ede1";%
%
! Here%we%can%see%how%the%hackers%are%using%this%code%to%decrypt%data%directly%from%the%control%
panel.%%
%
%
As%you%can%see,%we%marked%in%red%a%new%hidden%function%to%generate%random%encryption%key%and%to%decrypt%
the%selected%data.%This%functionality%is%available%through%a%hidden%keyboard%keys%combination%(Ctrl+Alt+F)%
and%has%been%discovered%during%the%static%code%analysis%of%obfuscated%JavaScript%code.%Here%is%a%sample%of%
the%analyzed%code:%
%
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%5%
%
%
! The%hacker%create%also%a%Jabber%settings%functionality%to%set%a%new%account%to%communicate%%
%
%
CONCLUSION$
Inside%the%Botnet%we%found%a%custom%control%panel%to%retrieve%information’s%stolen%by%the%malware.%The%
campaign%is%alive%and%is%targeting%eight%big%Italian%banks.%The%information%retrieved%is%encrypted%and%stored%
in%a%SQL%database%with%the%victim%IP%address.%
REMEDIATION$
? Update%antivirus%blacklist%to%detect%a%know?malware%
? Check%some%difference%in%the%bank%webpage%(difficult)%
? Don’t%bite%to%e?mail%phishing%
? Don’t%execute%suspicious%file%.exe%
This%research%article%is%a%short%technical%publication%focused%on%technical%approach%used%from%attackers.%
Because'the'attack'campaign'is'“ALIVE”'I'will'not'revel'the'real'IP'addresses'and'the'real'name'of'the'targeted'bank.'
One$Shot$Eight$Bank$
Page%6%
STATISTICS$
The%attack%is%alive%and%the%amount%of%the%hacked%users%is%increasing%every%week,%the%amount%of%the%hacked%
users%is%3?5%per%week%especially%on%some%banks.%Sometimes%attackers%are%removing%the%data%to%hide%the%
impact.%
%
ABOUT$the$RESEARCHERS$
%
Senad%Aruch.%
Multiple% Certified% ISMS% Professional% with% 10?year% background% in:% IT% Security,% IDS% and% IPS,% SIEM,% SOC,% Network%
Forensics,% Malware% Analyses,% ISMS% and% RISK,% Ethical% Hacking,% Vulnerability% Management,% Anti% Fraud% and% Cyber%
Security.% Currently% holding% a% Senior% Security% Specialist% position% at% Reply% s.p.a% ?% Communication% Valley% ?% Security%
Operations%Center.%Responsible%for%advanced%security%operations.%%%
E?Mail:%senad.aruc@gmail.com%
Blog:%www.senadaruc.com%
Twitter:%https://twitter.com/senadaruch%
LinkedIn:%https://www.linkedin.com/in/senadaruc
Davide%Cioccia%
MSc%Computer%Engineering%Degree.%Security%Developer%focused%on%Cyber%Security%Intelligence,%Malware%analysis,%Anti?
fraud%systems.%Microsoft%certified.%Currently%holding%a%Security%Consultant%position%at%Reply%s.p.a%?%Communication%
Valley%?%Security%Operations%Center.%
E?Mail:%davide.cioccia@live.it% %
Twitter:%https://twitter.com/david107%
LinkedIn:%https://www.linkedin.com/in/davidecioccia
%
Ad

Recommended

IJSRED-V2I4P0
IJSRED-V2I4P0
IJSRED
?
One shot eight banks
One shot eight banks
Davide Cioccia
?
GraphTalks Italy - Using graphs to fight financial fraud
GraphTalks Italy - Using graphs to fight financial fraud
Neo4j
?
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
GraphTalks Frankfurt - Leveraging Graph-Technology to fight financial fraud
Neo4j
?
Do it-yourself-audits
Do it-yourself-audits
Johann-Peter Hartmann
?
Iy2515891593
Iy2515891593
IJERA Editor
?
IRJET- Phishing Website Detection based on Machine Learning
IRJET- Phishing Website Detection based on Machine Learning
IRJET Journal
?
State of the Art Analysis Approach for Identification of the Malignant URLs
State of the Art Analysis Approach for Identification of the Malignant URLs
IOSRjournaljce
?
Online financial fraud infographic
Online financial fraud infographic
Prayukth K V
?
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
guest6561cc
?
Geo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser Cache
The Hacker News
?
Compromised e commerce_sites_lead_to_web-based_keyloggers
Compromised e commerce_sites_lead_to_web-based_keyloggers
Andrey Apuhtin
?
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
EMC
?
The Ransomware Threat: Tracking the Digitial Footprints
The Ransomware Threat: Tracking the Digitial Footprints
k3vb0t
?
Хакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентов
Positive Hack Days
?
Securing the Virtual Branch
Securing the Virtual Branch
Jay McLaughlin
?
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
?
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Aditya K Sood
?
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
SSLRenewals
?
Fade from Whitehat... to Black
Fade from Whitehat... to Black
Beau Bullock
?
The Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
David Jones
?
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
CODE BLUE
?
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
Symantec Website Security
?
Measurements in Cryptocurrency Networks
Measurements in Cryptocurrency Networks
Bernhard Haslhofer
?
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
?
Is Troy Burning: an overview of targeted trojan attacks
Is Troy Burning: an overview of targeted trojan attacks
Maarten Van Horenbeeck
?
Cybercrime In The Deep Web
Cybercrime In The Deep Web
Trend Micro
?
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
Marco Balduzzi
?
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
Senad Aruc
?
Puzzle Lock
Puzzle Lock
Senad Aruc
?

More Related Content

Similar to One Shot Eight Bank (20)

Online financial fraud infographic
Online financial fraud infographic
Prayukth K V
?
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
guest6561cc
?
Geo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser Cache
The Hacker News
?
Compromised e commerce_sites_lead_to_web-based_keyloggers
Compromised e commerce_sites_lead_to_web-based_keyloggers
Andrey Apuhtin
?
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
EMC
?
The Ransomware Threat: Tracking the Digitial Footprints
The Ransomware Threat: Tracking the Digitial Footprints
k3vb0t
?
Хакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентов
Positive Hack Days
?
Securing the Virtual Branch
Securing the Virtual Branch
Jay McLaughlin
?
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
?
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Aditya K Sood
?
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
SSLRenewals
?
Fade from Whitehat... to Black
Fade from Whitehat... to Black
Beau Bullock
?
The Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
David Jones
?
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
CODE BLUE
?
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
Symantec Website Security
?
Measurements in Cryptocurrency Networks
Measurements in Cryptocurrency Networks
Bernhard Haslhofer
?
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
?
Is Troy Burning: an overview of targeted trojan attacks
Is Troy Burning: an overview of targeted trojan attacks
Maarten Van Horenbeeck
?
Cybercrime In The Deep Web
Cybercrime In The Deep Web
Trend Micro
?
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
Marco Balduzzi
?
Online financial fraud infographic
Online financial fraud infographic
Prayukth K V
?
Symantec Internet Security Threat Report - 2009
Symantec Internet Security Threat Report - 2009
guest6561cc
?
Geo-Inference Attacks via the Browser Cache
Geo-Inference Attacks via the Browser Cache
The Hacker News
?
Compromised e commerce_sites_lead_to_web-based_keyloggers
Compromised e commerce_sites_lead_to_web-based_keyloggers
Andrey Apuhtin
?
2014 Cybercrime Roundup: The Year of the POS Breach
2014 Cybercrime Roundup: The Year of the POS Breach
EMC
?
The Ransomware Threat: Tracking the Digitial Footprints
The Ransomware Threat: Tracking the Digitial Footprints
k3vb0t
?
Хакеры хотят ваш банк больше, чем ваших клиентов
Хакеры хотят ваш банк больше, чем ваших клиентов
Positive Hack Days
?
Securing the Virtual Branch
Securing the Virtual Branch
Jay McLaughlin
?
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
Ammar WK
?
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
CrossTalk - The Art of Cyber Bank Robbery - Stealing your Money Through Insid...
Aditya K Sood
?
Internet Security Threat Report (ISTR) Government
Internet Security Threat Report (ISTR) Government
SSLRenewals
?
Fade from Whitehat... to Black
Fade from Whitehat... to Black
Beau Bullock
?
The Rise and Rise of Web Fraud
The Rise and Rise of Web Fraud
David Jones
?
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
A WINDOW INTO RUSSIAN SPEAKING CYBERCRIME by Tim Bobak
CODE BLUE
?
Website Security Threats - January 2014 Update
Website Security Threats - January 2014 Update
Symantec Website Security
?
Measurements in Cryptocurrency Networks
Measurements in Cryptocurrency Networks
Bernhard Haslhofer
?
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
shreemala1
?
Is Troy Burning: an overview of targeted trojan attacks
Is Troy Burning: an overview of targeted trojan attacks
Maarten Van Horenbeeck
?
Cybercrime In The Deep Web
Cybercrime In The Deep Web
Trend Micro
?
Cybercrime in the Deep Web (BHEU 2015)
Cybercrime in the Deep Web (BHEU 2015)
Marco Balduzzi
?

More from Senad Aruc (7)

Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
Senad Aruc
?
Puzzle Lock
Puzzle Lock
Senad Aruc
?
Revealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C Server
Senad Aruc
?
Target List of Hesper-BOT Malware
Target List of Hesper-BOT Malware
Senad Aruc
?
State of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards Revealed
Senad Aruc
?
Infostealer Botnet Reveal
Infostealer Botnet Reveal
Senad Aruc
?
Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.
Senad Aruc
?
Famous C&C servers from inside to outside.
Famous C&C servers from inside to outside.
Senad Aruc
?
Revealing Unique MitB Builder C&C Server
Revealing Unique MitB Builder C&C Server
Senad Aruc
?
Target List of Hesper-BOT Malware
Target List of Hesper-BOT Malware
Senad Aruc
?
State of ART Phishing Attack stealing 50K Credit Cards Revealed
State of ART Phishing Attack stealing 50K Credit Cards Revealed
Senad Aruc
?
Infostealer Botnet Reveal
Infostealer Botnet Reveal
Senad Aruc
?
Kins origin malware with unique ATSEngine.
Kins origin malware with unique ATSEngine.
Senad Aruc
?
Ad

Recently uploaded (20)

Logging and Automated Alerting Webinar.pdf
Logging and Automated Alerting Webinar.pdf
ControlCase
?
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
?
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
?
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
?
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
?
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
?
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
?
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
?
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
?
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
?
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
?
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
?
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
?
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
?
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
?
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
Logging and Automated Alerting Webinar.pdf
Logging and Automated Alerting Webinar.pdf
ControlCase
?
BitRecover OST to PST Converter Software
BitRecover OST to PST Converter Software
antoniogosling01
?
Transmission Control Protocol (TCP) and Starlink
Transmission Control Protocol (TCP) and Starlink
APNIC
?
Topic 1 Foundational IT Infrastructure_.pptx
Topic 1 Foundational IT Infrastructure_.pptx
oneillp100
?
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens RedTech Public Copy - Collaborate or Die
Clive Dickens
?
ChatGPT_and_Its_Uses_Presentationss.pptx
ChatGPT_and_Its_Uses_Presentationss.pptx
Neha Prakash
?
Topic 2 - Cloud Computing Basics,,,.pptx
Topic 2 - Cloud Computing Basics,,,.pptx
oneillp100
?
Make DDoS expensive for the threat actors
Make DDoS expensive for the threat actors
APNIC
?
inside the internet - understanding the TCP/IP protocol
inside the internet - understanding the TCP/IP protocol
shainweniton02
?
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
IAREUOUSTPIDWHY$)CHARACTERARERWUEEJJSKWNSND
notgachabite123
?
Almos Entirely Correct Mixing with Apps to Voting
Almos Entirely Correct Mixing with Apps to Voting
gapati2964
?
Pitch PitchPitchPitchPitchPitchPitch.pptx
Pitch PitchPitchPitchPitchPitchPitch.pptx
157551
?
Global Networking Trends, presented at the India ISP Conclave 2025
Global Networking Trends, presented at the India ISP Conclave 2025
APNIC
?
TCP/IP presentation SET2- Information Systems
TCP/IP presentation SET2- Information Systems
agnesegtcagliero
?
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
狠狠撸s: Eco Economic Epochs for The World Game (s) pdf
Steven McGee
?
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
最新版美国特拉华大学毕业证(鲍顿别濒毕业证书)原版定制
taqyea
?
ChatGPT A.I. Powered Chatbot and Popularization.pdf
ChatGPT A.I. Powered Chatbot and Popularization.pdf
StanleySamson1
?
Paper: The World Game (s) Great Redesign.pdf
Paper: The World Game (s) Great Redesign.pdf
Steven McGee
?
The ARUBA Kind of new Proposal Umum .pptx
The ARUBA Kind of new Proposal Umum .pptx
andiwarneri
?
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
PROCESS FOR CREATION OF BUSINESS PARTNER IN SAP
AhmadAli716831
?
Ad

One Shot Eight Bank