News

Coreflood Trojan Stole 500G of Personal Financial Data

A cache of stolen data gathered from a botnet that has been quietly sweeping up information for years contained the user names and passwords for:

  • 8,485 bank accounts
  • 3,233 credit card accounts
  • 151,000 e-mail accounts
  • 58,391 social networking site accounts
  • 4,237 online retailer accounts
  • 416 stock trading accounts
  • 869 payment processor accounts
  • 413 mortgage accounts
  • 422 finance company accounts

The Coreflood Trojan responsible for the infections has been around in one form or another since 2002, said Joe Stewart, director of malware research for SecureWorks Inc. The botnet is being used by a Russian crime group on whose command and control server Stewart found the stolen information. The data, which amounts to nearly 500 gigabytes, represents only six months of operations.

"They had erased the previous directories, probably because they didn't have room to keep it," Stewart said.

He estimated the group has stolen four times that amount of data, giving them access to accounts worth millions.

Stewart shared some of his research on Coreflood Wednesday at the Black Hat Briefings security conference. Because the Trojan has been circulating largely under the radar and spreads throughout an organization using a network administrator's privileges, it can be particularly insidious, he said.

"In the case of Coreflood, you've got people infected who didn't do anything wrong," such as visiting suspect Web sites, letting their anti-virus lapse or other unsafe computing practices. Because of this, it can take some expertise in IT security to be confident you are not infected. That has implications for the growing online economy. "If you're not an expert, you probably shouldn't be online doing financial transactions," he said. "I am very worried about anybody using Windows and banking online."

The Trojan apparently has been around since 2002, when it was being used for distributed denial-of-service attacks. It has since evolved to selling anonymity services and to full-fledged back fraud. Computers are infected through a browser exploit using ActiveX controls, and the Coreflood installer is then downloaded. Once a computer in an organization has been infected, the Trojan can wait until an administrator logs on to that computer, then gains the administrator's privileges to spread to the rest of the computers in the network.

Coreflood is not an unknown Trojan and anti-virus engines routinely update their signatures for it, as with other forms of malware in the wild. But it has not gained a lot of notoriety because its handlers apparently are not offering the exploit or their data on the open market. When Stewart stumbled on the database of stolen data on the command and control server, he found records of more than 378,000 bot IDs covering 16 months. The average lifespan for a Coreflood bot is 66 days.

The hackers cull through the information slowly.

"It is likely they are looking for the larger accounts," Stewart said. He found a group of 740 accounts for one bank, of which the hackers had managed to examine just 79. They ran log-in scripts on those accounts, which often replied with account balances. The 79 accounts had total balances of $281,000. The average size of each account was about $4,500 for a savings account and $2,000 for checking, but the largest account was $147,000.

They have been taking money out, Stewart said; in one case as much as $100,000. But the compromises can go unnoticed for a long time because of the sheer volume of data the criminals must go through.

"You may not see any activity on an account for months," he said. "They just don't have the time to go through it all."

The obvious question is, with all of this information available, why is Coreflood still out there?

"I wonder myself sometimes how they stay in business," Stewart said. The original command and control server was shut down by the service provider after it was discovered, but it was moved to a different server and is back in business. U.S. law enforcement agencies do not have the clout needed to prosecute the Russian criminals, he said.

"The relationships are not as good as they need to be to have effective action taken," he said. "The people in law enforcement tell me that to get anything done, they have to go through diplomatic channels," which can take years. "There has to be political pressure brought to bear. It has to be a priority."

So far this has not happened, but "we think there might be a better chance of getting these guys because of who they have infected," Stewart said. Among those compromised organizations with records found by Stewart was a state police department.

About the Author

William Jackson is the senior writer for Government Computer News (GCN.com).

comments powered by Disqus

Featured

  • AI for GitHub Collaboration? Maybe Not So Much

    No doubt GitHub Copilot has been a boon for developers, but AI might not be the best tool for collaboration, according to developers weighing in on a recent social media post from the GitHub team.

  • Visual Studio 2022 Getting VS Code 'Command Palette' Equivalent

    As any Visual Studio Code user knows, the editor's command palette is a powerful tool for getting things done quickly, without having to navigate through menus and dialogs. Now, we learn how an equivalent is coming for Microsoft's flagship Visual Studio IDE, invoked by the same familiar Ctrl+Shift+P keyboard shortcut.

  • .NET 9 Preview 3: 'I've Been Waiting 9 Years for This API!'

    Microsoft's third preview of .NET 9 sees a lot of minor tweaks and fixes with no earth-shaking new functionality, but little things can be important to individual developers.

  • Data Anomaly Detection Using a Neural Autoencoder with C#

    Dr. James McCaffrey of Microsoft Research tackles the process of examining a set of source data to find data items that are different in some way from the majority of the source items.

  • What's New for Python, Java in Visual Studio Code

    Microsoft announced March 2024 updates to its Python and Java extensions for Visual Studio Code, the open source-based, cross-platform code editor that has repeatedly been named the No. 1 tool in major development surveys.

Subscribe on YouTube