Banking Malware Uncovered After 5 Years
Security analysts at Kaspersky Labs have revealed another, complex malware that has been focusing on clients of a few Mexican financing establishments since 2013.
Named Dark Tequila, the advanced keylogger malware remained under the radar for a long time because of its exceedingly focused on a couple of evasion strategies.
Dark Tequila has basically been intended to take victim money related data from a not insignificant list of banking web services and popular websites.
The list of sites includes “Cpanels, Plesk, online flight reservation systems, Microsoft Office 365, IBM Lotus Notes clients, Zimbra email, Bitbucket, Amazon, GoDaddy, Register, Namecheap, Dropbox, Softlayer, Rackspace, and other services,” the analysts in a blog post.
Once executed, a payload infects the machine only after certain conditions are met, which includes testing if the computer has any antivirus or security software installed. In conclusion, “the threat actor behind it strictly monitors and controls all operations. If there is a casual infection, which is not in Mexico or is not of interest, the malware is uninstalled remotely from the victim’s machine,” the researchers say.
As it is more precisely evaluated in the article whole malware campaign functions through six modules:
“Most of the victims are located in Mexico. The campaign has been active since at least 2013, so it is a very ‘añejo’ (mature) product. There are two known infection vectors: spear-phishing and infection by USB device. The threat actor behind it strictly monitors and controls all operations. If there is a casual infection, which is not in Mexico or is not of interest, the malware is uninstalled remotely from the victim’s machine.” Said experts from Kaspersky.