Cybercrime

Lurk Banking Trojan Delivered via Ammyy Website

Cybercriminals breached the official website of the popular remote administration tool Ammyy Admin and leveraged it to deliver Lurk and other pieces of malware, researchers at Kaspersky Lab reported on Monday.

<p><strong><span><span>Cybercriminals breached the official website of the popular remote administration tool Ammyy Admin and leveraged it to deliver Lurk and other pieces of malware, researchers at Kaspersky Lab reported on Monday.</span></span></strong></p>

Cybercriminals breached the official website of the popular remote administration tool Ammyy Admin and leveraged it to deliver Lurk and other pieces of malware, researchers at Kaspersky Lab reported on Monday.

Lurk is a banking Trojan that has been used to target Russian financial institutions and other types of organizations. The threat has been around for five years and experts estimate that it has helped cybercrime gangs steal roughly $45 million.

Russian authorities recently arrested 50 individuals suspected of using the malware and the arrests are believed to have led to the disappearance of the notorious Angler exploit kit.

The Lurk Trojan has often been delivered via watering hole attacks, where a legitimate website is compromised and set up to serve malware. While in many cases attackers relied on exploits to deliver the threat, experts discovered that cybercriminals also used legitimate software.

Kaspersky Lab researchers noticed that victims infected with Lurk also had Ammyy installed on their systems. A closer analysis revealed that the Trojan, disguised as a file named “ammyysvc.exe,” was downloaded alongside the Ammyy installer from the official site.

Kaspersky first spotted Lurk on the Ammyy website in early February 2016. Ammyy developers were notified and they cleaned the site, but cybercriminals either still had access or they compromised it again because in April they started abusing it to deliver a modified version of Lurk that was specifically designed to target corporate networks.

The company again attempted to clean up its website, but researchers noticed on June 1 that it had been serving the Fareit Trojan. Ammyy developers have now once again removed the malware, but it remains to be seen if they’ve managed to properly secure their servers this time.

Experts believe cybercriminals had been counting on the fact that many administrators would likely not become suspicious if their security products detected a threat, knowing that some antiviruses flag the Ammyy software due to numerous instances where the application has been leveraged for malicious purposes.

Advertisement. Scroll to continue reading.

While Kaspersky only started seeing malware served from the Ammyy website in February, ESET reported in November 2015 that ammyy.com had been abused by a gang known as “Buhtrap” to deliver five different pieces of malware, including a Lurk downloader in late October. The website also hosted Corebot, Buhtrap, Ranbyus and Netwire RAT. Others reported that ammyy.com had been compromised since as early as July 2015.

“Using legitimate software for criminal purposes is a highly effective malware propagation technique,” said Vasily Berdnikov, malware analyst at Kaspersky Lab. “First of all because cybercriminals are able to play with users’ perceptions about the safety of the legitimate software they are downloading. By downloading and installing software from well-known developers, users do not think about the possibility that there may be malicious attachments involved. This makes it much easier for cybercriminals to get access to their targets and significantly increases their number of victims.”

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version