SlideShare una empresa de Scribd logo
1 de 72
Social Engineering in Banking Trojans
Attacking the weakest link
Jose Miguel Esparza
Mikel Gastesi
Agenda
• Social Engineering??
• Social Engineering + Malware
• HTML Injections
• Underground Market
• Solutions??
Social Engineering??
• The art of…
– … knowing how to handle people
Social Engineering??
• …or how to manipulate them
Social Engineering??
• …to Achieve an Objective
– Information gathering
– Buildings / Rooms access
– Power
– Material possessions
– Others: flirting, favors…
Social Engineering??
• …to Achieve an Objective
– Information gathering
– Buildings / Rooms access
– Power
– Material possessions
– Others: flirting, favors (sexual or not)…
• How?
– Face to face
– Phone / SMS
– Mail
– …
• Used by
– Politicians
– Salesmen
– Delinquents / Fraudsters
– You and me
Social Engineering??
Social Engineering??
Social Engineering??
• Take advantage of human nature
– Feelings / emotions / state of mind
– Behavior / personality
Social Engineering??
• Take advantage of human nature
– Feelings / emotions / state of mind
• Sadness
• Fear
• Rancor
• Embarrassment
• Happiness
• Love
• Hope
– Behavior / personality
Social Engineering??
• Take advantage of human nature
– Feelings / emotions / state of mind
– Behavior / personality
• Curiosity
• Inocence
• Honesty
• Generosity
• Gratitude
• Avarice
Social Engineering??
• Take advantage of human nature
– Feelings / emotions / state of mind
– Behavior / personality
• Tendency to trust
Social Engineering + Malware
Ransomware
Ransomware
Ransomware
Ransomware
Fake Antivirus
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes
• HTML Injections
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes
• HTML Injections
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes
• HTML Injections
GUI Applications
GUI Applications
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes
• HTML Injections
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes  Phishings
• HTML Injections
Banking Trojans
• Images Overlapping
• GUI Applications
• Pharming
• WebFakes
• HTML Injections
HTML Injections
HTML Injections
HTML Injections VS WebFakes
Injections – How they work (I)
• Trojan
– Binary
• Generic
– Keylogging, form-grabbing, etc.
– Stealing data silently
– Configuration file
• Specific affectation
– Custom attack to entities
– User interaction
Injections - How they work (II)
• Configuration
– Injecting where?
– Injecting what?
– Injecting when?
• Flags: G,P,L
Injections - How they work (III)
1. URI found?
2. Obtain webpage
3. Find starting mark
4. Injection
5. Copy from the ending mark
6. Obtain data thanks to formgrabbing
Injections – How they work (IV)
Authentication
Virtual Keyboard
Code Card
OTP Token
SMS : mTAN
PasswordID +
2FA
Bypassing Authentication
• ID + Password + Operations Password
Bypassing Authentication
• Virtual Keyboard
– Injection is not necessary here
Bypassing Authentication
• 2FA: Code Card
Bypassing Authentication
• 2FA: SMS
– Cheat on the user to infect his mobile phone
• Always after login
• Security Software simulation
• Activation simulation
• Profit from the ignorance of the threat
Bypassing Authentication
• ZeuS + Mobile Component (I)
Bypassing Authentication
• ZeuS + Mobile Component (and II)
Bypassing Authentication
• SpyEye + Mobile Component (I)
Bypassing Authentication
• SpyEye + Mobile Component (and II)
Bypassing Authentication
• 2FA: Token
– MitB Attack  It is NOT Social Engineering
• Mobile Transfer warnings?
– Let’s play “Simon says…”
Demo
Affected countries
Affected Sectors
Underground Market
• Binaries Market
• Injections Market
– Standardized
– Single Injections
– Full-package
Underground Market
• Binaries Market
• Injections Market
– Standardized  ZeuS & co. / SpyEye
– Single Injections
– Full-package
Underground Market
• Binaries Market
• Injections Market
– Standardized
– Single Injections
• Per countries and entities
• 60 WMZ/LR (WebMoney / Liberty Reserve)
• Package: 700-800 WMZ/LR
• Update / Modification: 20 WMZ/LR
– Full-package
Underground Market
Underground Market
• Binaries Market
• Injections Market
– Standardized
– Sólo inyecciones
– Full-package
• Botnet Renting + Injections
• $400??
Underground Market
Underground Market
• How do they create them?
– Obtaining legit code from the banking pages
– Injection creation
– Testing
Underground Market
• How do they create them?
– Obtaining legit code from the banking pages
– Injection creation
– Testing
Underground Market
• Obtaining legit code from the banking pages
– Manual
• Login + Dumping pages
Underground Market
• Obtaining legit code from the banking pages
– Automatic
• Specific modules
• Configuration file
Underground Market
• Obtaining legit code from the banking pages
– Automatic
• Specific modules
– Tatanga
• Configuration file
Underground Market
Underground Market
Underground Market
• Obtaining legit code from the banking pages
– Automatic
• Specific modules
• Configuration files
– ZeuS
– SpyEye
Underground Market
Underground Market
• How do they create them?
– Obtaining legit code from the banking pages
– Injection creation
– Testing
Underground Market
• How do they create them?
– Obtaining legit code from the banking pages
– Injection creation  SOCIAL ENGINEERING!!
– Testing
Underground Market
• How do they create them?
– Obtaining legit code from the banking pages
– Injection creation
– Testing
• Login
• Screenshots
• Video  Tatanga, Citadel
• Detection / Prevention
• Information / Trainings
• Common sense
Solutions??
• Detection / Prevention
– Client
• Check HTML structure (DOM)
– Server
• Additional parameters
• Dynamique pages  Avoid locating injection point
Solutions??
• Detection / Prevention
Solutions??
• Detection / Prevention
• Information / Trainings
• Common sense
Solutions??
• Detection / Prevention
• Information / Trainings
• Common sense
Solutions??
• Detection / Prevention
• Information / Trainings
• Common sense…is not so common
Solutions??
Conclusions
• If the user can make a transfer you will always
be able to cheat on him and change the
destination of the money
• How would you cheat on the user by phone?
Do it after the login, use a fake webpage, or
even call him!
Questions??
¡¡Thanks!!
Mikel Gastesi
@mgastesi
Jose Miguel Esparza
@EternalTodo

Más contenido relacionado

Similar a Social Engineering and Banking Trojans: How Criminals Manipulate Users

Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1vincentleone
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4gpioa
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation dhirujapla
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales Ahmed Musaad
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackersHarsh Sharma
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365AntonioMaio2
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterJose L. Quiñones-Borrero
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityGianluca Varisco
 
Social engineering
Social engineeringSocial engineering
Social engineeringRobert Hood
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfMansoorAhmed57263
 

Similar a Social Engineering and Banking Trojans: How Criminals Manipulate Users (20)

Social Engineering
Social EngineeringSocial Engineering
Social Engineering
 
Leone ct#1 presentation 1
Leone ct#1 presentation 1Leone ct#1 presentation 1
Leone ct#1 presentation 1
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Crontab Cyber Security session 4
Crontab Cyber Security session 4Crontab Cyber Security session 4
Crontab Cyber Security session 4
 
Information security Presentation
Information security Presentation  Information security Presentation
Information security Presentation
 
Red team Engagement
Red team EngagementRed team Engagement
Red team Engagement
 
Social engineering tales
Social engineering tales Social engineering tales
Social engineering tales
 
Cyber security
Cyber securityCyber security
Cyber security
 
Two-Steps to Owning MFA
Two-Steps to Owning MFATwo-Steps to Owning MFA
Two-Steps to Owning MFA
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Introduction to hackers
Introduction to hackersIntroduction to hackers
Introduction to hackers
 
Hacking
HackingHacking
Hacking
 
Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365Learn how to protect against and recover from data breaches in Office 365
Learn how to protect against and recover from data breaches in Office 365
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)Webinar cybersecurity presentation-6-2018 (final)
Webinar cybersecurity presentation-6-2018 (final)
 
Hacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR ChapterHacker risks presentation to ACFE PR Chapter
Hacker risks presentation to ACFE PR Chapter
 
Refugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on SecurityRefugees on Rails Berlin - #2 Tech Talk on Security
Refugees on Rails Berlin - #2 Tech Talk on Security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdfitsecurityawareness-v1-230413174238-5e7cba3c.pdf
itsecurityawareness-v1-230413174238-5e7cba3c.pdf
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Social Engineering and Banking Trojans: How Criminals Manipulate Users