Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Shifu Banking Trojan Targets UK Wealth Management Firms

Roughly a month ago, a new banking Trojan was found targeting the customers of 14 Japanese banks, and the malware is now said to be attacking banks and wealth management firms in the UK.

Roughly a month ago, a new banking Trojan was found targeting the customers of 14 Japanese banks, and the malware is now said to be attacking banks and wealth management firms in the UK.

Called Shifu, the sophisticated Trojan has been around since April and borrows features from a series of well-known malware familes, which allow it to capture passwords and user credentials from online forms, steal private certificates, and perform other actions that can help attackers hijack accounts and steal money.

According to IBM X-Force researchers, the malware has started to actively target banks and wealth management firms in the UK.

IBM’s security team says that the attacks started on September 22 and have targeted 18 organizations in an effort to conduct fraudulent transactions.

Researchers also explained that Shifu is based on a series of “tried-and-true Trojan mechanisms” from infamous malware and that it might have been created by savvy developers already familiar with other types of banking malware.

However, it appears that Shifu has evolved when compared to the Japanese attacks, and has already received internal changes meant to evade security measures.

The newly spotted UK samples reveal that the Trojan no longer injects into the explorer.exe process, but that it launches a new svchost instance which starts performing nefarious actions from that process, IBM said.

Shifu reportedly appeared in the UK in mid-September, but it infected only a few machines each day in the first week. By September 22, however, the infection campaign started spreading and hundreds of computers were infected per day.

Advertisement. Scroll to continue reading.

The infection is reportedly spreading through email spam in an effort to lead banking and wealth management customers to infected websites hosting the Angler exploit kit (EK). Angler, which emerged in 2013, has the ability to exploit a broad range of vulnerabilities in HTML, Java, JavaScript, Adobe Flash, Silverlight, and more.

“Shifu’s injections are selective and change according to the targeted entity. In some cases, it replaces the bank’s entire page with a fake replica designed to harvest the data Shifu’s operators are after,” Limor Kessem, cybersecurity evangelist at IBM, explained earlier this month. “In other cases, the Trojan displays social engineering content on the page using JavaScript injections to ask victims for additional authentication elements it will need for a subsequent fraudulent transaction, such as PII or one-time passwords.”

According to IBM X-Force researchers, the new Shifu campaign in the UK is a modest one at the moment, but it is expected to be followed by more widespread infection sprees in the UK. Furthermore, they predict that the Trojan will propagate in other parts of Europe and in the United States soon after.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.