Thinking of spending some time perusing Japanese porn websites before you do your online banking? Security researchers at ESET have analysed an organised malware campaign that stole the login credentials of online banking customers after infecting PCs that had visited X-rated websites.
Win32/Aibatook targets Japanese bank customers with an unusual Internet Explorer monitoring technique. We believe the malware has been in development for months - and is now ready for take-off.
A notorious strain of banking malware, known as Caphaw - or Shylock, due to snippets of Shakespeare’s Merchant of Venice embedded in its code - has seen its command and control servers shut down in a major international police operation.
Banking malware built to misdirect a Brazilian form of bank payment method targeted $3.75 billion of transactions over the past two years - and the scale of the attack may have eclipsed any single previous instance of electronic theft.
Hackers targeting sensitive information or stealing from retailers work at such speed that customers often notice data breaches first - and for the first time, cybercriminals are ‘teaming up’ with spies, according to a new report.
Win32/Corkow is banking malware with a focus on corporate banking users. We can confirm that several thousand users, mostly in Russia and Ukraine, were victims of the Trojan in 2013. In this post, we expand on its unique functionality.
A little-known banking trojan, developed in Russia, has managed to infect thousands of victims' computers without the knowledge of their owners. Graham Cluley takes a closer look.
The first sign we saw of this malware was in mid-May 2013, but it is still very active, and uses Android to bypass two-factor authentication systems. It clearly seeks to infect Dutch computers - 75% of detections come from this region.