En continuant à naviguer ou en cliquant sur « Accepter tous les Cookies et Services », vous acceptez de stocker des cookies tiers et internes sur votre terminal pour enregistrer les détails d'inscription, collecter des statistiques afin d'améliorer la convivialité, analyser l'utilisation du site et le contenu diffusé qui vous est fourni, et contribuer à nos efforts marketing. Lisez notre Déclaration de confidentialité.
Akamai, nous enregistrerons cette transcription à des fins de formation, de contrôle de la qualité et de marketing direct. Pour plus d'informations, lisez notre politique de confidentialité. Si vous continuez, nous acceptons l'enregistrement de cette session par Akamai et son utilisation conformément à sa politique de confidentialité.
Akamai Warns of Yummba Webinject Tools and Banking Fraud
Crime kit used on machines compromised by Zeus and other malware
Malicious actors alter webpages to steal information from banking users
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today released, through the company's Prolexic Security Engineering & Response Team (PLXsert), a new cybersecurity threat advisory. The advisory alerts banks and enterprises to the use of Yummba webinject tools in banking fraud. The advisory is available for download at www.stateoftheinternet.com/yummba.
Zeus crimeware has a history of being used to control compromised hosts (zombies) for many types of cybercrime, including the harvesting of banking credentials, building botnets for distributed denial of service (DDoS) attacks, and targeting platform-as-a-service (PaaS) and software-as-a-service (SaaS) infrastructures. Now, the added capabilities of Yummba custom webinjects make the malware even more dangerous. Webinject attacks available for sale in the wild vary in sophistication from simple attacks that report account information and credential theft to highly advanced webinjects that utilize ATSEngine for automated fund transfers to attacker-controlled accounts.
Each Yummba webinject is customized to match the look-and-feel of a website of a specific financial institution to fool the user into entering banking credentials. What's more, the Yummba webinjects work with the malicious Automatic Transfer System (ATSEngine), streamlining the process of wiring a victim's funds to a third-party account. As a result, a malicious actor using Yummba webinjects can inject dynamic content into a web display when a customer visits an online banking site, steal information from the user's session, and immediately and automatically transfer funds out of the victim's accounts.
"PLXsert has identified more than 100 financial institutions for which active webinjects are available in the wild. Most are mid-size and large financial institutions in North America and Europe," said Stuart Scholly, senior vice president and general manager, Security Business Unit, Akamai. "Preventing these attacks requires user education, improved security and system hardening, and international cooperation and community cleanup."
PLXsert anticipates the underground crimeware ecosystem will continue to produce new and more powerful tools like Yummba webinjects to take advantage of the massive number of exploited devices on the Internet.
Get the Yummba Webinject Tools Threat Advisory to learn more.
In the advisory, PLXsert shares its analysis and details, including:
Akamai® is the leading provider of cloud services for delivering, optimizing and securing online content and business applications. At the core of the Company’s solutions is the Akamai Intelligent Platform™ providing extensive reach, coupled with unmatched reliability, security, visibility and expertise. Akamai removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and enabling enterprises to securely leverage the cloud. To learn more about how Akamai is accelerating the pace of innovation in a hyperconnected world, please visit www.akamai.com or blogs.akamai.com, and follow @Akamai on Twitter.