Gameover ZeuS now targets users of employment websites
Posted on 25.03.2014
Some newer variants of the Gameover Zeus Trojan, which is exceptionally good at using complex web injections to perform Man-in-the-Browser (MITB) attacks and gain additional information about the victims to be used for bypassing multi-factor authentication mechanisms and effecting social engineering attacks, has been spotted targeting users of popular employment websites.

They initially focused on CareerBuilder.com (largest employment website in the US), but now also on Monster.com (one of the largest in the world).

The fake login page victims are served with looks virtually identical to the legitimate one, but the next one is web form injected by the malware:


There are 18 different questions to choose from, and they range from the name of the city where your sibling lives/you got your first job/you met your spouse, to the name of your school(s)/friend/work supervisor and significant dates and numbers in your life.

F-Secure researchers warn HR recruiters with website accounts to be on the lookout for any such irregularities.

"If the account is potentially tied to a bank account and a spending budget it's a target for banking trojans," they point out.









Spotlight

Total cost of average data breach reaches $3.8 million

The average consolidated total cost of a data breach is $3.8 million, according to a Ponemon Institute study of 350 companies spanning 11 countries. The average cost incurred for each lost or stolen record containing sensitive and confidential information increased from $145 to $154.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Thu, May 28th
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //