A new banking Trojan has been used to target the customers of more than a dozen Japanese banks, IBM reported on Monday.
Dubbed “Shifu,” the Japanese word for thief, the banking Trojan has been around since at least April, and it’s designed to target Japanese banks and select e-banking platforms used in Europe.
Currently, the malware is mainly active in Japan, where it has been used to target the customers of 14 financial organizations.
Researchers say Shifu is a sophisticated Trojan that appears to borrow features from several well-known pieces of malware. The threat uses a domain generation algorithm (DGA) similar to the one of the Shiz Trojan, anti-security and anti-research techniques taken from Zeus VM, a configuration file similar to the one used by Dridex, and stealth techniques from Gozi. The threat also wipes the local system restore point on infected computers just like the Conficker worm did several years ago.
The basic Shifu package includes a keylogger, a browser hooking and webinject parser mechanism, a screenshot grabber, a certificate harvester, remote access tool (RAT) and bot control modules, application monitoring functionality, and anti-research tools. Additional capabilities can be added via modules downloaded from the command and control (C&C) server.
The malware’s data theft capabilities for banking apps appear to be similar to the ones of the Shiz and Corcow Trojans, IBM said.
The Trojan is designed to capture passwords as they are typed by the victim, grab credentials entered by users into online forms, steal private certificates, scrape banking app authentication tokens, and exfiltrate data from smart cards attached to the infected device. This type of information can be used by the attackers to hijack accounts and steal money.
In addition to bank account data, Shifu also targets point-of-sale (PoS) endpoints via a RAM-scraping plugin, and e-banking platforms by stealing tokens used for short-term authorization on external authentication schemes.
In the case of electronic banking platforms, the Trojan also targets digital signature credentials issued to business banking users by certification authorities. Once they gain access to the credentials, cybercriminals can reset the PIN on the certificate and impersonate victims. IBM says the malware appears to particularly target business banking users from Italy.
For secure C&C communications, Shifu uses self-signed certificates, similar to the Dyre Trojan. Also similar to Dyre, Shifu doesn’t show web injections in the configuration file and instead retrieves them in real-time from a remote server.
Unlike other banking Trojans, Shifu uses an interesting technique for real-time web injections. When the malware infects a device, it sets up a local Apache server that is later used to decipher obfuscated requests sent when fetching web injects from the remote server.
“Shifu’s injections are selective and change according to the targeted entity. In some cases, it replaces the bank’s entire page with a fake replica designed to harvest the data Shifu’s operators are after,” Limor Kessem, cybersecurity evangelist at IBM, explained in a blog post. “In other cases, the Trojan displays social engineering content on the page using JavaScript injections to ask victims for additional authentication elements it will need for a subsequent fraudulent transaction, such as PII or one-time passwords.”
Another interesting feature found in Shifu is designed to keep other malware out. It prevents other threats from infecting the victim device by monitoring incoming files for ones that might carry malware, such as executables, unsigned files, and elements coming from HTTP connections.
Evidence uncovered by IBM suggests that the developers of Shifu are Russian speakers. However, attribution is difficult and experts have pointed out that the malware developers might simply be trying to throw researchers off track by including comments written in Russian and various strings that have meaning in Russian.
Related Reading: IBM Warns of New CoreBot Stealer
Related Reading: Tsukuba Banking Trojan Targets Users in Japan

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Intel Boasts Attack Surface Reduction With New 13th Gen Core vPro Platform
- Dole Says Employee Information Compromised in Ransomware Attack
- High-Severity Vulnerabilities Found in WellinTech Industrial Data Historian
- CISA Expands Cybersecurity Committee, Updates Baseline Security Goals
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
Latest News
- Intel Co-founder, Philanthropist Gordon Moore Dies at 94
- Google Leads $16 Million Investment in Dope.security
- US Charges 20-Year-Old Head of Hacker Site BreachForums
- Tesla Hacked Twice at Pwn2Own Exploit Contest
- CISA Ships ‘Untitled Goose Tool’ to Hunt for Microsoft Azure Cloud Infections
- Critical WooCommerce Payments Vulnerability Leads to Site Takeover
- PoC Exploit Published for Just-Patched Veeam Data Backup Solution Flaw
- CISA Gets Proactive With New Pre-Ransomware Alerts
