Author Topic: Banking Malware Source Code Leaked by Author to Gain Credibility Among Hackers  (Read 27 times)

0 Members and 1 Guest are viewing this topic.

Offline Quizmaster

  • Flying Nurse
  • Seasonal Competition Team
  • *
  • Posts: 23301
    • Smokey's Security Forums
  • .: Surf Queen
Banking Malware Source Code Leaked by Author to Gain Credibility Among Hackers
30 March 2017, 1:41 am

The source code for a new Trojan called Nuclear Bot has been leaked online, which may spark a rise in attacks against banking services. 

As it happens almost every time the source code for a malicious program lands online, it is quite likely to see more unskilled cybercriminals launching malware attacks against users. 

Nuclear Bot first landed on the dark web for sale back in December, for a mere $2,500. The malware can steal and inject information from and into websites opened in Firefox, Internet Explorer or Chrome, while also having the capability of opening a local proxy or hidden remote desktop service. 

These are pretty much common features among banking trojans as attacker seek to bypass security checks of online bank websites in order to go through with the fraud. 

A complicated tale

Researchers from IBM who have been keepin... (read more)

Source: Softpedia News / Security

>> To obtain the full Softpedia Security News article, click the link in the first post line <<


Except where otherwise stated, all content, graphics, banners and images included © 2006 - 2018 Smokey Services™ -- All rights reserved
Design board graphics, banners and images by DSTM & PseFrank

This site does not store profiling-, tracking-, third-party and/or any other non-essential cookie(s) on client computers and is fully compliant with the EU ePrivacy Directive
Smokey's does not use any Web Analytics/Analysis Service, and also does not use any browser fingerprinting techniques

Smokey's also provides free fully qualified Log / Malware Analysis & Removal Help and System Health Checks