Roughly a month ago, a new banking Trojan was found targeting the customers of 14 Japanese banks, and the malware is now said to be attacking banks and wealth management firms in the UK.
Called Shifu, the sophisticated Trojan has been around since April and borrows features from a series of well-known malware familes, which allow it to capture passwords and user credentials from online forms, steal private certificates, and perform other actions that can help attackers hijack accounts and steal money.
According to IBM X-Force researchers, the malware has started to actively target banks and wealth management firms in the UK.
IBM’s security team says that the attacks started on September 22 and have targeted 18 organizations in an effort to conduct fraudulent transactions.
Researchers also explained that Shifu is based on a series of “tried-and-true Trojan mechanisms” from infamous malware and that it might have been created by savvy developers already familiar with other types of banking malware.
However, it appears that Shifu has evolved when compared to the Japanese attacks, and has already received internal changes meant to evade security measures.
The newly spotted UK samples reveal that the Trojan no longer injects into the explorer.exe process, but that it launches a new svchost instance which starts performing nefarious actions from that process, IBM said.
Shifu reportedly appeared in the UK in mid-September, but it infected only a few machines each day in the first week. By September 22, however, the infection campaign started spreading and hundreds of computers were infected per day.
The infection is reportedly spreading through email spam in an effort to lead banking and wealth management customers to infected websites hosting the Angler exploit kit (EK). Angler, which emerged in 2013, has the ability to exploit a broad range of vulnerabilities in HTML, Java, JavaScript, Adobe Flash, Silverlight, and more.
“Shifu’s injections are selective and change according to the targeted entity. In some cases, it replaces the bank’s entire page with a fake replica designed to harvest the data Shifu’s operators are after,” Limor Kessem, cybersecurity evangelist at IBM, explained earlier this month. “In other cases, the Trojan displays social engineering content on the page using JavaScript injections to ask victims for additional authentication elements it will need for a subsequent fraudulent transaction, such as PII or one-time passwords.”
According to IBM X-Force researchers, the new Shifu campaign in the UK is a modest one at the moment, but it is expected to be followed by more widespread infection sprees in the UK. Furthermore, they predict that the Trojan will propagate in other parts of Europe and in the United States soon after.

More from SecurityWeek News
- In Other News: RSA Encryption Attack, Meta AI Privacy, ShinyHunters Hacker Guilty Plea
- In Other News: New Analysis of Snowden Files, Yubico Goes Public, Election Hacking
- In Other News: China Blames NSA for Hack, AI Jailbreaks, Netography Spin-Off
- SecurityWeek to Host Cyber AI & Automation Summit
- US Marks 22 Years Since 9/11 Terrorist Attacks
- In Other News: LastPass Vault Hacking, Russia Targets Ukraine Energy Facility, NXP Breach
- Webinar Today: Scaling Software Supply Chain Security
- In Other News: Hacking Encrypted Linux Computers, Android Fuzzing, Skype Leaking IPs
Latest News
- Synqly Joins Race to Fix Security, Infrastructure Product Integrations
- ZDI Discusses First Automotive Pwn2Own
- Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies
- US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform
- Actor Tom Hanks Warns of Ad With AI Imposter
- Network, Meet Cloud; Cloud, Meet Network
- Dozens of Malicious NPM Packages Steal User, System Data
- Motel One Discloses Ransomware Attack Impacting Customer Data
