Wells Fargo clients are again targeted by data-stealing malware through a well-crafted spam campaign. The Trojan known as Fareit comes packed with a password-stealing component that allows malware writers to gather sensitive details from users’ devices, including Facebook and email credentials.
According to Bitdefender data, the systems most infected with this family of Trojans are located in the US, home to Wells Fargo. In the last week, the same type of Trojan has been making rounds in France, Croatia, Italy, Australia, Belgium, Spain, Romania, Egypt, and the United Arab Emirates.
Fareit is a multiple-component malware family that consists of a password-stealing component that grabs sensitive information from the victim’s computer and sends it to a remote machine. The malware family also contains a DDoS component that may be controlled to flood other servers in collective attacks. Once installed, the malware also downloads and executes Zbot or Zeus, one of the most notorious and widespread Trojans so far.
With a general subject such as “Important Documents” the malicious emails pose as coming from Wells Fargo employees. To make the spam look legit, scammers included links to the authentic financial institution. When opening the attachment, which is also dubbed with the bank’s name, users end up installing a hidden EXE file packed in a PDF extension.
When executed, the Fareit Trojan silently installs itself on vulnerable systems where it starts searching for sensitive details such as passwords and usernames. It also connects with the remote machine controlled by the attackers to make configuration updates and, on command, download additional malware. The Trojan also extracts passwords and usernames from browsers and mail clients, so be sure you disable the options that allow them to remember all your credentials.
Fareit also grabs account information such as server names, port numbers, login IDs and passwords from the FTP clients or cloud storage programs installed on the victim’s computer.
Bank clients are an easy target for cyber-criminals, who go as far as creating fake websites from scratch to trick individual users. Such fraudulent web pages look similar to the authentic ones, sometimes posing as their branches or local offices.
Bitdefender offers some tips to enhance protection against this type of malware attacks:
This article is based on the technical information provided courtesy of Octavian Minea and Cristina Vatamanu, Bitdefender Malware Researchers.
All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.
tags
Bianca Stanescu, the fiercest warrior princess in the Bitdefender news palace, is a down-to-earth journalist, who's always on to a cybertrendy story.
View all postsNovember 14, 2024
September 06, 2024