IcedID banking trojan now used against online retailers

silversurfer

Level 85
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Malware Hunter
Well-known
Aug 17, 2014
10,176
The malicious actors behind the IcedID banking trojan have branched out and are now using the malware to steal payment card credentials from online retailers and may have even become malware-as-a-service dealers.

The e-tailer attacks began in November 2018 and instead of grabbing customer banking information, IcedID is used to grab credentials and payment card data from victims, said Limor Kessem, Global Executive Security Advisor, IBM Security.These are then used to make purchases at the target retailer in the user’s name with their payment cards and since they have all the necessary information the threat actors can make purchases at other locations.

Interestingly, Kessem said the cybergang is pursuing this line of attack separately from its primary online bank fraud operations. This could mean they are either simply branching out looking for new revenue streams or renting or selling botnet sections to other criminals, turning it to a cybercrime-as-a-service operation, similar to the Gozi Trojan’s business model,” she said.

The idea of simply moving from banking to online commerce makes a great deal of sense. Traditionally when a cybergang looks to increase its thieving ability it expands into new geographical areas. However, Kessem pointed out it is less expensive and labor intensive to stay in one place, in this case North America, and simply use the tools at hand to steal from a different source.

IBM has a complete rundown on how the malware operates here.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top