Canalys Names Trend Micro as Worldwide Leader of the Small Business Content Security Market for the Second Consecutive Year
Canalys places Trend Micro as leading world content security market share 2012 and 2011
Canalys places Trend Micro as leading world content security market share 2012 and 2011
Last week, we noticed thousands of malware files in the wild that employ a simple phishing attack by modifying the hosts file on Windows systems. What’s interesting, however, is the technique chosen by the malware authors to distribute their payload. The samples in question (Example MD5: 34d9b42bfd64c6f752fe27eef8d80c5f) are packaged in a ZIP file along with Read more…
Shylock は、オンラインバンキングを狙うきわめて高度なトロイの木馬であり(以前の記事を参照)、今も金融詐欺の脅威の分野では無視できない存在です。2011 年に控え目に登場して以来、その感染数は英国、イタリア、米国で増え続けていますが、標的となる金融機関の数も同様に増加しています。現在は、英国を中心として 60 以上の金融機関が標的となっています。
Shylock の主な目的は、標的となる金融機関の Web サイトのリストを作成して、MITB(Man-in-the-Browser)攻撃を仕掛けることです。この攻撃を利用してユーザーの個人情報を盗み出し、ソーシャルエンジニアリング手法によってユーザーを誘導して、狙った金融機関で不正な取引を実行させます。
追加モジュール
最近この Shylock が、機能を拡張するために追加のモジュールをダウンロードし、実行するようになりました。以下のモジュールが開発され、Shylock によってダウンロードされています。
インフラ
Shylock は堅ろうなインフラを採用しています。トラフィック量の多い時間帯の冗長化と負荷分散が有効になっているので、サーバーは着信接続の数に応じて侵入先のコンピュータを別のサーバーにリダイレクトします。
Shylock で利用されている最初のレベルのサーバーは特定されており、次の 3 つのグループに分類されます。

図 1. Shylock のインフラで使われているサーバーのグループ
これらは、メインコンポーネントの制御に利用されているプロキシサーバーです。これらのサーバーの主な目的は、更新した以下の設定ファイルやモジュールを侵入先のコンピュータに提供して、Shylock の感染数を維持することにあります。
侵入先のコンピュータで、新たに追加されたモジュールが実行されると、レポートログが C&C サーバーに送信されます。ログは暗号化通信を使って適切なサーバーにリダイレクトされ、サーバーは相互に Secure Socket Layer(SSL)として機能します。各サーバーは、相互の通信に以下のプロトコルを利用します。
現在は、5 つの中央 C&C サーバーが Shylock ボットネットを制御しています。これらのサーバーは、ドイツと米国の複数のホスティングプロバイダに置かれています。
標的変化を示すグラフ
Shylock は当初、英国内のコンピュータを主な標的としていましたが、今では他の国や地域にも広がっています。その一方、なかには標的として狙われなくなってきた金融機関もあります。セキュリティ対策が向上したため、あるいは高価値の業務用顧客を持っていないためと考えられ、Shylock はもっと見返りの大きそうな金融機関に的を絞り直しつつあります。

図 2. Shylock に感染したコンピュータ数(2011 年~ 2013 年)

図 3. 標的となる業種
Shylock の新しい攻撃は今後も続くものと予測され、シマンテックは Shylock の活動を引き続き監視していきます。
シマンテックの保護対策
いつものことですが、基本的なセキュリティ対策(ベストプラクティス)に従って、ソフトウェアの最新パッチがインストールされていることを確認してください。また、最新のシマンテック製品とウイルス定義をお使いいただくことで、これらの脅威から保護することができます。
* 日本語版セキュリティレスポンスブログの RSS フィードを購読するには、http://www.symantec.com/connect/ja/item-feeds/blog/2261/feed/all/ja にアクセスしてください。
We call it ‘The Wave of Regret’. This term, coined by my Online Safety for Kids partner, Peter Andrada, defines a movement we predict will happen in the near future where content shared by kids on social media applications will come to life and change their future permanently. We’ve all done things in our youth Read more…
Bitcoin, a new form of electronic money, nabbed global attention yesterday after a hack attack forced a dramatic fall in its value. After trading as high as $147 just a few days prior, the hack knocked an entire bitcoin service offline “indefinitely,” crippling others as the exchanges fought off hack-related trading lags. Wait – What Read more…
Speed. Availability. Security. Name recognition. These are things everyone cares about, in any online industry. Whether you’re selling shoes, running a charity, or operating a multi-national company with global online presence, it matters that your customers feel safe to interact online with you, and that they have a fast, efficient experience at your site to bring them back again.
Speed and availability are becoming two of the biggest challenges for hosting companies and SSL providers alike. Speed of OCSP lookup is important, to keep within acceptable guidelines of page load times. Symantec is constantly looking for ways to improve, and we invest in expanding our infrastructure to enhance speed and reliability. GlobalSign has advertised that they outsourced their OCSP lookup to CloudFlare. Now, there’s nothing wrong with a company outsourcing services, if it helps operate more safely and efficiently.
Alas CloudFlare has had some significant recent outages, so while speedy they have failed now and again at availability. You can read their KB article here. And any certificate authority who thinks this level of service is acceptable clearly isn’t taking their customer’s security seriously enough.
Symantec has military-grade data centers protecting our SSL and PKI infrastructure, and our validation edge infrastructure has delivered 100% uptime for many years. We have speed, availability, and security covered.
Shylock (a.k.a. The Merchant of Malice) is one of the most sophisticated banking Trojan horse programs presently occupying the financial fraud threat landscape. From its humble beginnings in 2011, it has seen increased infections in the United Kingdom, Italy, and the United States. This is consistent with the increased number of targeted financial institutions over that time period. Shylock is currently targeting over 60 financial institutions with the majority of them operating in the United Kingdom.
The main purpose of Shylock is to perform a man-in-the-browser (MITB) attack against a configured list of target organization websites. The attack is used to steal user credentials and apply social engineering tactics in order to convince the user to perform fraudulent transactions at the target institution.
Additional modules
Recently, Shylock has begun downloading and executing complementary modules in order to beef up its functionality. The following modules have been developed and are being downloaded by the threat.
Infrastructure
The Trojan employs a robust infrastructure that allows for redundancy and load-balancing during periods of high traffic, whereby servers will redirect compromised computers to another server depending on the number of incoming connections.
The first level of servers belonging to this threat has been identified and can be categorized into the following three groups:

Figure 1. Groups of servers utilized in Shylock’s infrastructure
These are proxy servers that are used to control the main component. The main purpose of these servers is to maintain the Shylock infection base by providing the following updated configuration files and modules to compromised computers:
When a compromised computer performs one of the new, additional modules, it sends a report log to the C&C server. These logs are then redirected to the appropriate server using encrypted communication—the servers act as a secure socket layer (SSL) to each other. The servers use the following protocols when communicating with each other:
Five central C&C servers are currently controlling the Shylock botnet. These servers are situated in Germany and the United States at various hosting providers.
Evidence of a strain migration
At first, Shylock was specifically targeting computers located in the United Kingdom but it is now spreading to other countries. Also, as some financial institutions become less desirable as targets, either due to increased security measures or a lack of high-value business accounts, Shylock is refocusing its attacks on those offering potentially larger returns.

Figure 2. Computers infected with Shylock between 2011 and 2013

Figure 3. Targeted sectors
We expect to see new iterations of this threat in the wild and are continuing to monitor the threat landscape.
Symantec Protection
As always, we recommend that you follow best security practices and ensure that you have the most up-to-date software patches in place, and that you use the latest Symantec technologies and virus definitions to ensure that you have the best protection against threats.
At Avast, we know how precious a good night’s sleep is. You can relax and sleep soundly knowing that avast! Antivirus is protecting your devices. From your family’s PCs or Macs to the Android phone in your pocket or tablet on your nightstand – avast! is guarding against prowlers, snoops, and thieves. Check out the […]
How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox Yes, if […]
How’s this for a good phishing scam? Everything seems legit: 1. From email is “customerservice@utsa.edu” 2. No misspelled words and has decent grammar (however, some punctuation inconsistency) 3. Copyright (c) symbol next to the university name 4. Gmail did not filter it as spam, but left it in my normal inbox Yes, if […]