Dubbed "Dyreza," the malware targets users of a number of major online banking services in the US and the UK: Bank of America, Natwest, Citibank, RBS, and Ulsterbank.
"The code is designed to work similar to ZeuS and as most online banking threats it supports browser hooking for Internet Explorer, Chrome and Firefox and harvests data at any point an infected user connects to the targets specified in the malware," shared CSIS researcher Peter Kruse.
The Trojan is currently being delivered through emails purportedly coming from the aforementioned financial institutions and, once run, the attached malicious file beacons back to its C&Cs.
The malware also allows attackers control browser traffic and perform Man-in-the-Middle attacks. By having this opportunity to read all the encrypted traffic between the victims' browser and the financial institutions' servers, they can also try to circumvent 2-factor authentication.
"We believe this is a new banker trojan family and not yet another offspring from the ZeuS source code," says Kruse. "Still it's unclear if this is provided as a "Crime as a Service" or if it's a full circle criminal outfit."
They managed to track down some of the malware's C&C servers, and have even accessed parts of them and found a customized "money mule" panel with several accounts in Latvia.
Kruse also warns users to be wary of future spam campaigns delivering the Trojan, as there are indications that the crooks will try to push it onto users by masquerading it as a Flash Player update.