Research

Brazilian Trojan Bankers Now Digitally Signed

How easy is it for bad guys to buy valid digital certificates from CAs using fake data and then start signing Trojan bankers with them? In Brazil it appears to be very easy.

Today most software developers digitally sign their programs. The process involves Certification Authorities (CAs) that must verify the authenticity of the files and issue a certificate to the developers.

As we know, valid or stolen digital certificates are used by some malware authors to create files that can go undetected for some time and be recognized as legitimate. Now Brazilian cybercriminals have started using this technique in their malware in an attempt to gain more time to spread files undetected. Recently we found a Trojan banker signed with a valid digital certificate issued by a CA. It appears that fake company data was used to obtain the certificate.

How easy is it for a CA to check if the data they receive is legitimate or not? Brazilian cybercriminals registered a domain called gastecnology.org, copying the name of a well-known and trusted local software company. This is the data used to register the domain:

The data is totally fake. The domain was registered using a free webmail (Yahoo). The address, in the beautiful city of Vitória, is for a residential build:

The telephone number used to register the domain is also fake; it’s not located in Vitória (where the area code is 27), but in Pernambuco state (area code 81). But even using the forged data in the registered domain, the criminals were able to buy digital certificates from Comodo, issued on 28 May, and valid until 29 May 2015:

After this easy step, they started signing their Trojans:

After a mass mailing campaign that requested Brazilian Internet banking users to install an “update”, some users were infected.

One of the Trojans, besides being digitally signed, used another trick that is common among malware authors: HP was mentioned in the file description in an attempt to trick users into believing it was a legitimate file.

The digital certificates were revoked by Comodo 15 days after being issued following an alert from a local security company. Kaspersky detects it as Trojan-Banker.Win32.Banbra.atfl.

Brazilian Trojan Bankers Now Digitally Signed

Your email address will not be published. Required fields are marked *

 

Reports

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

WildPressure targets the macOS platform

We found new malware samples used in WildPressure campaigns: newer version of the C++ Milum Trojan, a corresponding VBScript variant with the same version number, and a Python script working on both Windows and macOS.

Ferocious Kitten: 6 years of covert surveillance in Iran

Ferocious Kitten is an APT group that has been targeting Persian-speaking individuals in Iran. Some of the TTPs used by this threat actor are reminiscent of other groups, such as Domestic Kitten and Rampant Kitten. In this report we aim to provide more details on these findings.

Subscribe to our weekly e-mails

The hottest research right in your inbox