Transcript
Page 1: The Evolution of Webinjects
Page 2: The Evolution of Webinjects

The evolution of webinjects

Jean-Ian Boutin

ESET

Page 3: The Evolution of Webinjects

• Webinject Evolution

• Webinject Commoditization

• Emergence of Popular Kits

• Webinject Delivery

Outline

Page 4: The Evolution of Webinjects

Webinject Evolution

Page 5: The Evolution of Webinjects

• Keyloggers

• Form grabbing

– Inspect GET/POST requests

• Injects are specifically made for one banking Trojan platform

• Only a couple of institutions are available

• Institutions are geo-located

The Beginnings

Page 6: The Evolution of Webinjects

Keyword indicating which URL is targeted

Popular webinject format

Page 7: The Evolution of Webinjects

Popular webinject format

Target URL

Page 8: The Evolution of Webinjects

Popular webinject format

Flags (Get, Post)

Page 9: The Evolution of Webinjects

Popular webinject format

Keywords specifying where the code should be injected in the webpage

Page 10: The Evolution of Webinjects

Popular webinject format

Code to inject

Page 11: The Evolution of Webinjects

• Login grabber

• Injection of additional fields

• Balance grabber/changer

• TAN Grabber

• Full Automatic Transfer Systems (ATS or AZ - avtozaliv)

Increase in Functionalities

Page 12: The Evolution of Webinjects

Phish-like inject

Page 13: The Evolution of Webinjects

• Allow transfers to be done automatically

• Inject code able to browse to correct page, fill transfer information, etc

• Not as attractive nowadays due to complexity

Automatic Transfer Systems

Page 14: The Evolution of Webinjects

• Several form factor exists

Transaction Authorization Number (TAN)

Page 15: The Evolution of Webinjects

• Inject content tricking the user into entering a TAN

Social Engineering (1/2)

Page 16: The Evolution of Webinjects

Social Engineering (2/2)• Inject content

tricking the user into installing a malicious application

Page 17: The Evolution of Webinjects

Popular Webservices Targeted

• Extra content is injected as soon as user logs into his account

• Usually phishing-like webinjects

Page 18: The Evolution of Webinjects

Webinject Commoditization

Page 19: The Evolution of Webinjects

Custom Tools

Page 20: The Evolution of Webinjects

Cheap Webinjects

Page 21: The Evolution of Webinjects
Page 22: The Evolution of Webinjects

ATS

• Some webinject seller can include android components to bypass mTAN

Page 23: The Evolution of Webinjects

Panels

• Some scripts with advanced capabilities come with an administration panel

Page 24: The Evolution of Webinjects

• Two types of offering for webinject

– Public

– Private

• Partnership, where the revenue can be shared, are also mentioned by some inject coders

Public/Private webinject and Partnerships

Page 25: The Evolution of Webinjects

Emergence of Popular Kits

Page 26: The Evolution of Webinjects

ATSEngine

• ATSEngine panel screenshots

• Seen in Qadars, ZeusVM, Neverquest/Vawtrak, Citadel, GOZ

Page 27: The Evolution of Webinjects

Injeria

• Used in several banking Trojans: Qadars, Tilon, Torpig

• JS downloaded from external source, using a distinctive URL

Page 28: The Evolution of Webinjects

• Several different project types

– log-<project-name>

– mob-<project-name>

– req-<project-name>

– app-<project-name>

Injeria

Page 29: The Evolution of Webinjects

• The code and URL structures

• The admin panel design

• Sometimes underground adverts and features correlation is possible

How to track them?

Page 30: The Evolution of Webinjects

ATSEngine - ID

Page 31: The Evolution of Webinjects

ATSEngine - ID

Page 32: The Evolution of Webinjects

Webinject Delivery

Page 33: The Evolution of Webinjects

Inline vs. external downloads

Page 34: The Evolution of Webinjects

Inline vs. external downloads

Page 35: The Evolution of Webinjects

• Advantages

– Hinder forensic analysis

– Feature based selling

– Maintenance by original seller

– New webinject code does not have to be downloaded right away by the bot

JS – External Download

Page 36: The Evolution of Webinjects

External Sever Interactions

Page 37: The Evolution of Webinjects

External Server Interactions

Page 38: The Evolution of Webinjects

Conclusion

Page 39: The Evolution of Webinjects

• Webinjects have evolved tremendously in the past few years

• In several banking Trojans, it is the true attack code

• Webinject commoditization is well in place

• As different webinject platforms are available, some are more popular than others

Conclusion

Page 40: The Evolution of Webinjects

• Special thanks to Anton Cherepanov

• Questions?

@jiboutin

Thank You!!


Top Related