{"id":2862,"date":"2010-06-21T14:06:35","date_gmt":"2010-06-21T21:06:35","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=2862"},"modified":"2018-01-30T12:26:56","modified_gmt":"2018-01-30T19:26:56","slug":"keylogger-poses-as-document-from-spains-central-bank","status":"publish","type":"post","link":"https://www.webroot.com/blog/2010\/06\/21\/keylogger-poses-as-document-from-spains-central-bank\/","title":{"rendered":"Keylogger Poses as Document from Spain&#8217;s Central Bank"},"content":{"rendered":"<p class=\"getsocial\" style=\"text-align: left;\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2001.png\" \/><a title=\"Add to Facebook\" href=\"http:\/\/www.facebook.com\/sharer.php?u=http:\/\/blog.webroot.com\/2010\/06\/21\/keylogger-poses-as-document-from-spains-central-bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Facebook\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2011.png\" \/><\/a><a title=\"Add to Digg\" href=\"http:\/\/digg.com\/submit?phase=2&amp;url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;title=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Digg\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2021.png\" \/><\/a><a title=\"Add to Del.icio.us\" href=\"http:\/\/del.icio.us\/post?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;title=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Del.icio.us\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2031.png\" \/><\/a><a title=\"Add to Stumbleupon\" href=\"http:\/\/www.stumbleupon.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;title=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Stumbleupon\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2041.png\" \/><\/a><a title=\"Add to Reddit\" href=\"http:\/\/reddit.com\/submit?url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;title=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Reddit\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2051.png\" \/><\/a><a title=\"Add to Blinklist\" href=\"http:\/\/www.blinklist.com\/index.php?Action=Blink\/addblink.php&amp;Description=&amp;Url=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;Title=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Blinklist\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2061.png\" \/><\/a><a title=\"Add to Twitter\" href=\"http:\/\/twitter.com\/home\/?status=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Centra...+%40+http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Twitter\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2071.png\" \/><\/a><a title=\"Add to Technorati\" href=\"http:\/\/www.technorati.com\/faves?add=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Technorati\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2081.png\" \/><\/a><a title=\"Add to Furl\" href=\"http:\/\/www.furl.net\/storeIt.jsp?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;t=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Furl\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2091.png\" \/><\/a><a title=\"Add to Newsvine\" href=\"http:\/\/www.newsvine.com\/_wine\/save?u=http%3A%2F%2Fblog.webroot.com%2F2010%2F06%2F21%2Fkeylogger-poses-as-document-from-spains-central-bank&amp;h=Keylogger%20Poses%20as%20Document%20from%20Spain%27s%20Central%20Bank\" target=\"_blank\"><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"Add to Newsvine\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2101.png\" \/><\/a><img decoding=\"async\" style=\"border: 0; margin: 0; padding: 0;\" alt=\"\" src=\"http:\/\/getsocialserver.files.wordpress.com\/2009\/02\/gs2111.png\" \/><\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100621_bde_zbot_fakepage.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"alignleft size-full wp-image-2868\" title=\"20100621_bde_zbot_fakepage_opener\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100621_bde_zbot_fakepage_opener.jpg\" width=\"399\" height=\"182\" \/><\/a>An attempt to push down the <strong>Trojan-Backdoor-Zbot<\/strong> password thief to Spaniards may signal a new wave of attacks by a crew of attackers who spent the better part of 2009 trying to convince gullible Internet users in different countries to download and execute Zbot installers poorly disguised as transaction records or other important financial documents.<\/p>\n<p>A bogus <a href=\"http:\/\/www.bde.es\/homee.htm\" target=\"_blank\"><strong>Banco de Espa\u00f1a<\/strong> (BdE) Web site<\/a> came and went quickly last week, but not before we took a deep dive and came up with a mouthful of malware. Believe me, it tasted terrible.<\/p>\n<p>The page, designed to mimic closely the appearance of the Spanish central bank&#8217;s Web site, was very much a clone of the previous fake-bank pages used to foist Zbot onto victims.<\/p>\n<p>Previous campaigns of this type targeted, primarily, North American victims by spoofing the Web sites belonging to <a href=\"http:\/\/blog.webroot.com\/2009\/12\/11\/visa-targeted-again-by-zbot-phishers\/\" target=\"_blank\">Visa<\/a>, <a href=\"http:\/\/blog.webroot.com\/2009\/10\/26\/lazy-phishers-just-email-the-phishing-web-page-to-you-now\/\" target=\"_blank\">Bank of America, the FDIC<\/a>, the <a href=\"http:\/\/blog.webroot.com\/2010\/01\/27\/zbot-fakes-aba-banking-site-seeks-a-stimulus-package\/\" target=\"_blank\">American Bankers Association<\/a>, <a href=\"http:\/\/blog.webroot.com\/2009\/11\/12\/phishing-scheme-targets-e-payment-processor-nacha\/\" target=\"_blank\">NACHA<\/a>, the IRS (and its equivalent <a href=\"http:\/\/blog.webroot.com\/2009\/10\/14\/irs-tax-warning-fraud-crosses-the-pond\/\" target=\"_blank\">British<\/a> tax authority), as well as <a href=\"http:\/\/blog.webroot.com\/2010\/05\/17\/fake-amazon-com-order-emails-bring-a-trojany-friend\/\" target=\"_blank\">Amazon.com<\/a>, <a href=\"http:\/\/blog.webroot.com\/2010\/02\/05\/massive-spam-campaign-impersonates-social-networks\/\" target=\"_blank\">iTunes<\/a>, <a href=\"http:\/\/blog.webroot.com\/2009\/11\/02\/facebook-phishing-campaign-wants-your-passwords\/\" target=\"_blank\">Facebook<\/a>, <a href=\"http:\/\/blog.webroot.com\/2010\/02\/05\/massive-spam-campaign-impersonates-social-networks\/\" target=\"_blank\">MySpace<\/a>, <a href=\"http:\/\/blog.webroot.com\/2010\/01\/21\/zbot-desperately-seeking-aim-users\/\" target=\"_blank\">AOL<\/a>, the <a href=\"http:\/\/blog.webroot.com\/2009\/12\/01\/fake-zbot-site-poses-as-h1n1-flu-vaccine-info\/\" target=\"_blank\">Centers for Disease Control and Prevention<\/a>, and many others.<\/p>\n<p><!--more--><\/p>\n<p>The fake Banco de Espa\u00f1a Web page, hosted on a server based in Russia, followed the same pattern set in so many previous Zbot campaigns: The URL included some of the real financial entity&#8217;s domain name, but was actually hosted on a server elsewhere; The potential victim was encouraged to download and open some sort of financial statement (the file itself was labeled &#8220;declaracion.exe&#8221; (statement) and the visitor was instructed to <em>descargar declaraci\u00f3n<\/em> (&#8220;download statement&#8221;). Of course, this <em>declaraci\u00f3n<\/em> was the Zbot installer. After the computer became infected, the keylogger downloaded instructions from a different Russian Web domain, then lay in wait for a victim to log into his or her online bank accounts or other Web sites.<\/p>\n<p><a href=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100621_bde_zbot_fakepage_descargar.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-2867 alignnone\" title=\"20100621_bde_zbot_fakepage_descargar\" alt=\"\" src=\"http:\/\/webrootblog.files.wordpress.com\/2010\/06\/20100621_bde_zbot_fakepage_descargar.jpg\" width=\"280\" height=\"151\" \/><\/a><\/p>\n<p>While we haven&#8217;t seen this trick in several months, the low-key approach by Zbot&#8217;s distributors doesn&#8217;t make the Trojan any less dangerous. It&#8217;s capable of stealing saved passwords from Internet-connected applications, browsers, cookies, Remote Desktop, and the Protected Storage area within Windows. It&#8217;s a password stealing machine, literally and figuratively.<\/p>\n<p>As we&#8217;ve seen in previous Zbot fake-page scams, the Web site doesn&#8217;t actually rely on the potential victim downloading and executing the Zbot installer him- or herself. Just by visiting the fake page, you can become infected: If the visitng PC is running an older version of Internet Explorer, the page tries to use browser exploits to push malware down to the victim. In this case, we also came down with a case of <strong>Trojan-Pushu<\/strong>, a spambot.<\/p>\n<p>The same advice to users applies in each of these cases: Don&#8217;t follow links in email that purport to lead to a page on your country&#8217;s central bank (unless, of course, you happen to be your country&#8217;s finance minister, or work for the central bank&#8217;s Web team, in which case you shouldn&#8217;t click any links leading to Web sites in the .ru top-level domain); Don&#8217;t download or execute any <em>Declaraci\u00f3n<\/em> with a file extension of<strong> .exe<\/strong>; and use the Firefox browser with the NoScript plugin as a way to safeguard your computer against unexpected attacks.<br \/>\n<a title=\"wordpress blog stats\" href=\"http:\/\/www.statcounter.com\/wordpress.com\/\" target=\"_blank\"><img decoding=\"async\" alt=\"wordpress blog stats\" src=\"http:\/\/c.statcounter.com\/4868061\/0\/92d716bc\/1\/\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>An attempt to push down the Trojan-Backdoor-Zbot password thief to Spaniards may signal a new wave of attacks by a crew of attackers who spent the better part of 2009 trying to convince gullible Internet users in different countries to download and execute Zbot installers poorly disguised as transaction records or other important financial documents. [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[7575,7569,7591,7587,7579,7577,4481,7573,3919,7581,7589,7585,7571,7049,3471,4313,4621,6089,6973,7583],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2862"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=2862"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2862\/revisions"}],"predecessor-version":[{"id":23738,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/2862\/revisions\/23738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=2862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=2862"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=2862"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=2862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}