SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
page 1R S A M O N T H LY F R A U D R E P O R T
F R A U D R E P O R T
MALWARE TOOLS FOR SALE ON THE OPEN WEB
May 2014
RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop
server used by a fraudster who is offering a set of spyware tools for sale under the vendor
names TampStore and Crown Softwares.
The online store offers a number of software packages made up of sets of tools presented
openly as legitimate “spyware”, with individual package icons in different colors for each
of the products. These tools offer a number of features that may be illegal in many
regions, and are commonly used by malware developers to steal data from infected PCs.
The online store offers the following ‘products’:
–– TampZusa – stealer application for stealing information and images from browsers,
email clients, keylogging, screen captures, webcam, and messenger clients
–– TampStealer – same as TampZusa, with a few extra bonuses added to the package
(see feature list below)
–– TampKelogger Classic – a basic case-sensitive keylogger that can also record window
titles
–– TampKeylogger Premium – a full featured keylogger that also includes all the features
of the TampStealer
–– TampSpammer – a basic mass-mailer spamming application
Of all the listed products, the TampStealer appears to be the most complete package of
spyware tools. The following is a list of the features advertised in the online store.
page 2R S A M O N T H LY F R A U D R E P O R T
TampStealer feature list:
–– Case sensitive keylogger
–– Print screen stealer (screen capture)
–– Webcam stealer
–– Browser password stealer – Opera, Chrome, Firefox, Safari, Internet Explorer, Netscape
–– Avira firewall bypass
–– Mass email dispatcher
–– Silent file downloaders
–– Multi-client remote administration
–– Send logs to FTP or PHP (PHP logger included in package)
–– FileZilla stealer
–– Stealer for the following email clients– Outlook, Windows Mail, Eudora, IncrediMail,
Netscape
–– PidGin stealer (messenger client)
–– Icon changer application, including an icon package
The fraudster does not seem to be shy about advertising his wares on Facebook or
exposing numerous email addresses for himself in various forums and public social
networking sites. RSA has traced a number of entries posted by him in a Romanian
computer hacker forum as well as advertising his availability for hire in a web
programming forum.
Upon further investigation of the administration panel and log files of the
TampStealer application, RSA uncovered records of stolen login credentials. One
log file from the TampStealer application, contained as many as 8,145 stolen login
records (see Figure 1 below).
page 3R S A M O N T H LY F R A U D R E P O R T
CONCLUSION
Offering cybercrime software tools for sale is not new. However, advertising them out
on the open web and social networking sites like Facebook is quite unusual. This
particular software tool author does not seem to be afraid or concerned about
exposing his software or his email addresses to the general public. Such behavior
goes against the trend of pushing cybercriminal activity further underground as has
been witnessed by RSA over the last two years.
page 4R S A M O N T H LY F R A U D R E P O R T
Phishing Attacks per Month
RSA identified 52,554 phishing attacks
in April, marking a 24% increase from
March’s attack numbers. Based on this
figure, RSA estimates phishing cost global
organizations $448 million in losses
in April.
US Bank Types Attacked
While nationwide banks continue to be
the most targeted by phishing with 58%
of total volume in April, regional banks have
continued to see an increase in volume
as well.
Top Countries by Attack Volume
The U.S. remained the most targeted
country in April with an overwhelming 76%
of global phishing volume, followed by the
UK, the Netherlands, and South Africa.
52,554
Attacks
Credit Unions
Regional
National
76%
4%
3%
3%
Netherlands
South Africa
UK
U.S.
MAY 2014
Source: RSA Anti-Fraud Command Center
page 5R S A M O N T H LY F R A U D R E P O R T
Top Countries by Attacked Brands
Over 50% of phishing attacks in March
were targeted at brands in the U.S., UK,
India, Italy and Canada.
Top Hosting Countries
The U.S. hosted 34% of global phishing
attacks in April, followed by Germany, the
Netherlands, and Italy.
Mobile Transactions and Fraud (Q1 ’14)
In Q1, 33% of banking transactions
originated in the mobile channel. Among
total transactions, 2% of all identified
fraud was from a mobile device.
9%
U.S.
UK
27%
5% 5%7%
34%
GLOBAL PHISHING LOSSES
APRIL 2014
2%
33%
2%
$ $ $ $ $
$ $ $ $ $
$ $ $ $ $
$ $ $ $ $
$ $ $ $ $
$ $ $ $ $
$ $ $
33%
www.emc.com/rsa
CONTACT US
To learn more about how RSA products, services, and solutions help solve your
business and IT challenges contact your local representative or authorized reseller –
or visit us at www.emc.com/rsa
©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC
Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective
holders. MAY RPT 0314

Contenu connexe

En vedette

Extended project qualification
Extended project qualificationExtended project qualification
Extended project qualification
Khendle Christie
 
Friday defeat of napoleon
Friday defeat of napoleonFriday defeat of napoleon
Friday defeat of napoleon
Travis Klein
 
Federmanager bo convegno impermanenza_27_03_13
Federmanager bo  convegno impermanenza_27_03_13Federmanager bo  convegno impermanenza_27_03_13
Federmanager bo convegno impermanenza_27_03_13
Marco Frullanti
 
10 countries comparison
10 countries comparison10 countries comparison
10 countries comparison
Travis Klein
 

En vedette (17)

Informe general
Informe generalInforme general
Informe general
 
Ինչպիսին պետք է լինի
Ինչպիսին պետք է լինիԻնչպիսին պետք է լինի
Ինչպիսին պետք է լինի
 
20140703 madrebonita
20140703 madrebonita20140703 madrebonita
20140703 madrebonita
 
Topic 9 final accounts
Topic 9 final accountsTopic 9 final accounts
Topic 9 final accounts
 
Extended project qualification
Extended project qualificationExtended project qualification
Extended project qualification
 
Friday defeat of napoleon
Friday defeat of napoleonFriday defeat of napoleon
Friday defeat of napoleon
 
Analisi di Usabilità di Libero Mail
Analisi di Usabilità di Libero MailAnalisi di Usabilità di Libero Mail
Analisi di Usabilità di Libero Mail
 
Ppp.doc
Ppp.docPpp.doc
Ppp.doc
 
Federmanager bo convegno impermanenza_27_03_13
Federmanager bo  convegno impermanenza_27_03_13Federmanager bo  convegno impermanenza_27_03_13
Federmanager bo convegno impermanenza_27_03_13
 
мультимедийные технологии
мультимедийные технологиимультимедийные технологии
мультимедийные технологии
 
1 tribe review
1   tribe review1   tribe review
1 tribe review
 
Adopting Intelligence-Driven Security
Adopting Intelligence-Driven SecurityAdopting Intelligence-Driven Security
Adopting Intelligence-Driven Security
 
Make your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient MetaphorsMake your presentations stick (2): Magnficient Metaphors
Make your presentations stick (2): Magnficient Metaphors
 
10 countries comparison
10 countries comparison10 countries comparison
10 countries comparison
 
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage SystemsTechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
TechBook: IMS on z/OS Using EMC Symmetrix Storage Systems
 
Stalking the Kill Chain
Stalking the Kill ChainStalking the Kill Chain
Stalking the Kill Chain
 
Exchange Server 2013 Architecture Deep Dive, Part 2
Exchange Server 2013 Architecture Deep Dive, Part 2 Exchange Server 2013 Architecture Deep Dive, Part 2
Exchange Server 2013 Architecture Deep Dive, Part 2
 

Plus de EMC

Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 

Plus de EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

RSA Monthly Online Fraud Report – May 2014

  • 1. page 1R S A M O N T H LY F R A U D R E P O R T F R A U D R E P O R T MALWARE TOOLS FOR SALE ON THE OPEN WEB May 2014 RSA Research, while investigating a Zeus Trojan sample, discovered an additional drop server used by a fraudster who is offering a set of spyware tools for sale under the vendor names TampStore and Crown Softwares. The online store offers a number of software packages made up of sets of tools presented openly as legitimate “spyware”, with individual package icons in different colors for each of the products. These tools offer a number of features that may be illegal in many regions, and are commonly used by malware developers to steal data from infected PCs. The online store offers the following ‘products’: –– TampZusa – stealer application for stealing information and images from browsers, email clients, keylogging, screen captures, webcam, and messenger clients –– TampStealer – same as TampZusa, with a few extra bonuses added to the package (see feature list below) –– TampKelogger Classic – a basic case-sensitive keylogger that can also record window titles –– TampKeylogger Premium – a full featured keylogger that also includes all the features of the TampStealer –– TampSpammer – a basic mass-mailer spamming application Of all the listed products, the TampStealer appears to be the most complete package of spyware tools. The following is a list of the features advertised in the online store.
  • 2. page 2R S A M O N T H LY F R A U D R E P O R T TampStealer feature list: –– Case sensitive keylogger –– Print screen stealer (screen capture) –– Webcam stealer –– Browser password stealer – Opera, Chrome, Firefox, Safari, Internet Explorer, Netscape –– Avira firewall bypass –– Mass email dispatcher –– Silent file downloaders –– Multi-client remote administration –– Send logs to FTP or PHP (PHP logger included in package) –– FileZilla stealer –– Stealer for the following email clients– Outlook, Windows Mail, Eudora, IncrediMail, Netscape –– PidGin stealer (messenger client) –– Icon changer application, including an icon package The fraudster does not seem to be shy about advertising his wares on Facebook or exposing numerous email addresses for himself in various forums and public social networking sites. RSA has traced a number of entries posted by him in a Romanian computer hacker forum as well as advertising his availability for hire in a web programming forum. Upon further investigation of the administration panel and log files of the TampStealer application, RSA uncovered records of stolen login credentials. One log file from the TampStealer application, contained as many as 8,145 stolen login records (see Figure 1 below).
  • 3. page 3R S A M O N T H LY F R A U D R E P O R T CONCLUSION Offering cybercrime software tools for sale is not new. However, advertising them out on the open web and social networking sites like Facebook is quite unusual. This particular software tool author does not seem to be afraid or concerned about exposing his software or his email addresses to the general public. Such behavior goes against the trend of pushing cybercriminal activity further underground as has been witnessed by RSA over the last two years.
  • 4. page 4R S A M O N T H LY F R A U D R E P O R T Phishing Attacks per Month RSA identified 52,554 phishing attacks in April, marking a 24% increase from March’s attack numbers. Based on this figure, RSA estimates phishing cost global organizations $448 million in losses in April. US Bank Types Attacked While nationwide banks continue to be the most targeted by phishing with 58% of total volume in April, regional banks have continued to see an increase in volume as well. Top Countries by Attack Volume The U.S. remained the most targeted country in April with an overwhelming 76% of global phishing volume, followed by the UK, the Netherlands, and South Africa. 52,554 Attacks Credit Unions Regional National 76% 4% 3% 3% Netherlands South Africa UK U.S. MAY 2014 Source: RSA Anti-Fraud Command Center
  • 5. page 5R S A M O N T H LY F R A U D R E P O R T Top Countries by Attacked Brands Over 50% of phishing attacks in March were targeted at brands in the U.S., UK, India, Italy and Canada. Top Hosting Countries The U.S. hosted 34% of global phishing attacks in April, followed by Germany, the Netherlands, and Italy. Mobile Transactions and Fraud (Q1 ’14) In Q1, 33% of banking transactions originated in the mobile channel. Among total transactions, 2% of all identified fraud was from a mobile device. 9% U.S. UK 27% 5% 5%7% 34% GLOBAL PHISHING LOSSES APRIL 2014 2% 33% 2% $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ 33%
  • 6. www.emc.com/rsa CONTACT US To learn more about how RSA products, services, and solutions help solve your business and IT challenges contact your local representative or authorized reseller – or visit us at www.emc.com/rsa ©2014 EMC Corporation. EMC, RSA, the RSA logo, and FraudAction are trademarks or registered trademarks of EMC Corporation in the U.S. and/or other countries. All other trademarks mentioned are the property of their respective holders. MAY RPT 0314