Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Fraud & Identity Theft

Remote Overlay Toolkit Makes Online Banking Fraud Easy

A new toolkit discovered late last year by researchers at IBM Trusteer allows even less skilled cybercriminals to steal online banking credentials and abuse them for fraudulent transactions.

A new toolkit discovered late last year by researchers at IBM Trusteer allows even less skilled cybercriminals to steal online banking credentials and abuse them for fraudulent transactions.

The toolkit, dubbed KL-Remote, is used for remote overlay attacks which enable cybercrooks to access online banking accounts directly from victims’ computers without raising too much suspicion.

The threat has been spotted in Brazil, a country where, according to studies, criminals made $264 million in 2013 through Internet banking fraud. KL-Remote is interesting because, unlike many other pieces of financial malware, it requires manual intervention from the individual who controls it.

According to researchers, an attack involving KL-Remote starts with the attacker installing the toolkit on the target’s computer, usually with the aid of other malware. Once installed, the threat monitors victims’ online activities to see if they access the websites of certain financial institutions.

When one of the targeted sites is accessed, the individual who controls the malware is alerted and provided with information on the victim’s device, including IP address, operating system, processor, and connection speed.

The toolkit comes with an easy-to-use graphical interface that shows the victim’s desktop and what they’re typing. The interface also includes features for taking control of the mouse and the keyboard, and for presenting victims with various messages that can be used to obtain valuable information.

The threat takes a screenshot of the banking website and displays it to the user. The cybercriminal then uses the tool to push a message on top of that image. The message is different for each website and it instructs victims to enter the information needed by the attacker to gain access to the banking account. This information can include usernames and passwords, and one-time passwords generated by security devices provided by banks to their customers.

Once the information is handed over by the victim, KL-Remote displays a new message instructing them to wait until the process is completed. While the user waits, the attacker takes control of the computer and logs in to the online banking account. The fraudster’s actions are not seen by the victim because everything takes place behind the screenshot displayed on the screen.

Advertisement. Scroll to continue reading.

IBM Trusteer researchers highlight that such a tool can be highly effective in bypassing traditional anti-fraud mechanisms. That’s because the attacker can obtain the information needed to access the account simply by requesting it from the victim, and since every action is performed directly from the user’s computer, which is considered a trusted devices, no red flags are raised.

According to experts, remote overlay attacks can be mitigated on the client side by ensuring that the endpoint doesn’t become infected with malware in the first place. On the server side, such attacks can be detected by looking for evidence of a malware infection, unusual browsing patterns, the use of remote access tools to log in to the banking account, and unusual transactions.

“Toolkits such as KL-Remote — which package a preconfigured fraud flow in a user-friendly GUI — greatly expand the pool of people who can commit banking fraud. With the toolkit, a criminal with basic technical skills can perform high-end fraud attacks that can circumvent strong authentication. Furthermore, the ability to embed the toolkit in types of common malware greatly increases its availability and reach,” Ori Bach, senior product marketing manager at Trusteer, wrote in a blog post.

KL-Remote is currently only available in Brazil with the phishing messages written in Portuguese, but researchers have determined that the toolkit can be adapted for other countries as well. The fraud toolkit costs less than $400, IBM Tursteer told SecurityWeek.

On Tuesday, IBM unveiled the z13, a sophisticated mainframe computer that provides real-time encryption and analytics for securing mobile transactions and preventing fraud.

*Updated with KL-Remote pricing information

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Fraud & Identity Theft

Famed hacker Kevin Mitnick has died after a battle with pancreatic cancer.  At the time of his death, he was Chief Hacking Officer at...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Cybercrime

Deepfakes, left unchecked, are set to become the cybercriminals’ next big weapon

Cybercrime

A threat actor tracked as ‘Scattered Spider’ is targeting telecommunications and business process outsourcing (BPO) companies in an effort to gain access to mobile...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Cybercrime

While there are likely many different approaches, here are a few points that are important for enterprises to consider when evaluating bot solutions.