'Mousetrap' Banking Trojan Triggers Intricate Cash Grab

Catch up with NBC News Clone on today's hot topic: Wbna46823931 - Breaking News | NBC News Clone. Our editorial team reformatted this story for clarity and speed.

Some bank heists need more than one crook to do the job, and the same is true in the world of online robbery, as a new and intricately structured banking Trojan demonstrates.

Some bank heists need more than one crook to do the job, and the same is true in the world of online robbery, as a new and intricately structured banking Trojan demonstrates.

Dubbed the "Mousetrap Trojan" by the security firm Bitdefender, the artillery kicks off its campaign by injecting Java applets into websites; when victims visit these sites and click on a prompt provided by what looks like a real version of Adobe Flash Player, the Trojan, called "Trojan.Downloader.Java.OpenConnection.BA," embeds itself by adding rogue code to the Web pages.

The original bad applet then downloads and installs a second piece of malware on the victim's computer, Bitdefender said. This second Trojan saves itself in a writeable location on the computer under the name "Temp_flash_file.phx." As it creates a shortcut ensuring it will run every time the system starts up, the rigged file then downloads and installs a list of "a dozen available links that lead to different banker Trojans."

[Swimsuit Supermodel Carries Trojan for Mac Users]

What does this technical talk mean to you and your money?

These dozen banking Trojan links all have the same goal — your bank account login — and the same method of getting it, by presenting fake login screens that mimic your bank's website, intercepting your credentials and feeding them to a remote server.

Unlike a real-life bank robbery, the crooks in this case are invisible, and so is their getaway car.

"Once on the system, the banker updates itself by downloading newer versions from a second list of links," Bitdefender explained. "The updates hide out in different locations so that if one is detected, the rest can still be accessed."

After the Trojan sets the cybercrime scheme in motion, it deletes itself from the victim's system, covering its tracks and making it difficult to trace it back to its creators.

Some proactive steps to protect yourself from this and other online banking Trojans : make sure your anti-virus software is current, never enter your bank account login credentials on a page you've been redirected to, or one that looks different than your actual bank's site. Most online banking Web pages are configured with HTTPS encryption, ensuring your transactions are secure. Look for the "HTTPS" highlighted in green in the URL before you enter type any sensitive information. Also, regularly monitor your bank account for any suspicious transactions.

×
AdBlock Detected!
Please disable it to support our content.

Related Articles

Donald Trump Presidency Updates - Politics and Government | NBC News Clone | Inflation Rates 2025 Analysis - Business and Economy | NBC News Clone | Latest Vaccine Developments - Health and Medicine | NBC News Clone | Ukraine Russia Conflict Updates - World News | NBC News Clone | Openai Chatgpt News - Technology and Innovation | NBC News Clone | 2024 Paris Games Highlights - Sports and Recreation | NBC News Clone | Extreme Weather Events - Weather and Climate | NBC News Clone | Hollywood Updates - Entertainment and Celebrity | NBC News Clone | Government Transparency - Investigations and Analysis | NBC News Clone | Community Stories - Local News and Communities | NBC News Clone