News

Coreflood Trojan Stole 500G of Personal Financial Data

A cache of stolen data gathered from a botnet that has been quietly sweeping up information for years contained the user names and passwords for:

  • 8,485 bank accounts
  • 3,233 credit card accounts
  • 151,000 e-mail accounts
  • 58,391 social networking site accounts
  • 4,237 online retailer accounts
  • 416 stock trading accounts
  • 869 payment processor accounts
  • 413 mortgage accounts
  • 422 finance company accounts

The Coreflood Trojan responsible for the infections has been around in one form or another since 2002, said Joe Stewart, director of malware research for SecureWorks Inc. The botnet is being used by a Russian crime group on whose command and control server Stewart found the stolen information. The data, which amounts to nearly 500 gigabytes, represents only six months of operations.

"They had erased the previous directories, probably because they didn't have room to keep it," Stewart said.

He estimated the group has stolen four times that amount of data, giving them access to accounts worth millions.

Stewart shared some of his research on Coreflood Wednesday at the Black Hat Briefings security conference. Because the Trojan has been circulating largely under the radar and spreads throughout an organization using a network administrator's privileges, it can be particularly insidious, he said.

"In the case of Coreflood, you've got people infected who didn't do anything wrong," such as visiting suspect Web sites, letting their anti-virus lapse or other unsafe computing practices. Because of this, it can take some expertise in IT security to be confident you are not infected. That has implications for the growing online economy. "If you're not an expert, you probably shouldn't be online doing financial transactions," he said. "I am very worried about anybody using Windows and banking online."

The Trojan apparently has been around since 2002, when it was being used for distributed denial-of-service attacks. It has since evolved to selling anonymity services and to full-fledged back fraud. Computers are infected through a browser exploit using ActiveX controls, and the Coreflood installer is then downloaded. Once a computer in an organization has been infected, the Trojan can wait until an administrator logs on to that computer, then gains the administrator's privileges to spread to the rest of the computers in the network.

Coreflood is not an unknown Trojan and anti-virus engines routinely update their signatures for it, as with other forms of malware in the wild. But it has not gained a lot of notoriety because its handlers apparently are not offering the exploit or their data on the open market. When Stewart stumbled on the database of stolen data on the command and control server, he found records of more than 378,000 bot IDs covering 16 months. The average lifespan for a Coreflood bot is 66 days.

The hackers cull through the information slowly.

"It is likely they are looking for the larger accounts," Stewart said. He found a group of 740 accounts for one bank, of which the hackers had managed to examine just 79. They ran log-in scripts on those accounts, which often replied with account balances. The 79 accounts had total balances of $281,000. The average size of each account was about $4,500 for a savings account and $2,000 for checking, but the largest account was $147,000.

They have been taking money out, Stewart said; in one case as much as $100,000. But the compromises can go unnoticed for a long time because of the sheer volume of data the criminals must go through.

"You may not see any activity on an account for months," he said. "They just don't have the time to go through it all."

The obvious question is, with all of this information available, why is Coreflood still out there?

"I wonder myself sometimes how they stay in business," Stewart said. The original command and control server was shut down by the service provider after it was discovered, but it was moved to a different server and is back in business. U.S. law enforcement agencies do not have the clout needed to prosecute the Russian criminals, he said.

"The relationships are not as good as they need to be to have effective action taken," he said. "The people in law enforcement tell me that to get anything done, they have to go through diplomatic channels," which can take years. "There has to be political pressure brought to bear. It has to be a priority."

So far this has not happened, but "we think there might be a better chance of getting these guys because of who they have infected," Stewart said. Among those compromised organizations with records found by Stewart was a state police department.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

comments powered by Disqus

Featured

  • New 'Visual Studio Hub' 1-Stop-Shop for GitHub Copilot Resources, More

    Unsurprisingly, GitHub Copilot resources are front-and-center in Microsoft's new Visual Studio Hub, a one-stop-shop for all things concerning your favorite IDE.

  • Mastering Blazor Authentication and Authorization

    At the Visual Studio Live! @ Microsoft HQ developer conference set for August, Rockford Lhotka will explain the ins and outs of authentication across Blazor Server, WebAssembly, and .NET MAUI Hybrid apps, and show how to use identity and claims to customize application behavior through fine-grained authorization.

  • Linear Support Vector Regression from Scratch Using C# with Evolutionary Training

    Dr. James McCaffrey from Microsoft Research presents a complete end-to-end demonstration of the linear support vector regression (linear SVR) technique, where the goal is to predict a single numeric value. A linear SVR model uses an unusual error/loss function and cannot be trained using standard simple techniques, and so evolutionary optimization training is used.

  • Low-Code Report Says AI Will Enhance, Not Replace DIY Dev Tools

    Along with replacing software developers and possibly killing humanity, advanced AI is seen by many as a death knell for the do-it-yourself, low-code/no-code tooling industry, but a new report belies that notion.

  • Vibe Coding with Latest Visual Studio Preview

    Microsoft's latest Visual Studio preview facilitates "vibe coding," where developers mainly use GitHub Copilot AI to do all the programming in accordance with spoken or typed instructions.

Subscribe on YouTube