Researchers say criminals are moving their malware heavy lifting  from end user PCs to servers in the cloud.
    The same flexibility and freedom companies get from having    their software and services hosted in the cloud is enabling    cybercriminals to conduct highly automated online banking theft    -- without doing much of the necessary information processing    on their victims' own computers.  
    Security and privacy experts have long worried that criminals    would launch attacks on the servers storing the data in cloud    environments. But, a     report released this week from     McAfee and Guardian Analytics shows that criminals are now    using the cloud infrastructure itself to get more capability    out of their campaigns.  
    "They are leveraging the cloud," Brian Contos, senior director    of emerging markets at McAfee, said in an interview. "This is    the first time we've ever seen this."  
    Basically, what researchers uncovered was a series of highly    sophisticated campaigns designed to siphon money out of high    balance bank accounts in Europe, the U.S. and South America    through automated transfers. Like most online consumer bank    fraud, the attacks started off with a phishing e-mail,    typically pretending to be from a victim's bank and urging the    recipient to click a link to change the account password. Once    the link is clicked, a Trojan -- in this case Zeus or SpyEye --    was downloaded onto the victim's computer, in early versions of    the attacks. In later versions the malware is operating from a    server.  
    When the victim goes to log into the bank site, the malware    would use a so-called Web inject technique to overlay what    looks like the bank Web page in the victim's browser. However,    behind the scenes and totally transparent to the victim,    something entirely different is happening. While the victim    thinks he or she is transferring money from a savings account    into a checking account, for instance, the malware is actually    transferring any amount of money the criminals specify into    their own account.  
    Traditionally, banking malware like this will handle the    processing from the victim's PC. But in this case, the heavy    lifting of the malware is being done on the server in the    cloud, according to Contos. In the operations McAfee and    Guardian Analytics uncovered the servers were located in    eastern European countries, he said. The servers are located    mostly at "bullet proof" ISP that have lax policies and are    re-located frequently to avoid discovery.  
    "The servers are sitting within ISPs that are designed    specifically to take part in fraud," he said, adding that the    criminals in these campaigns even managed to bypass two-factor    authentication systems commonly used in European consumer    online banking. For instance, not only does a consumer type in    a username and password to a site, but also swipes a card into    a special card reader attached to the PC that provides    additional data proof that the legitimate user is accessing the    account.  
    The servers -- at least 60 were used in these operations --    provided the criminals with the ability to fully automate the    attacks, so less manual intervention is needed on the part of    the attacker to do things like adjust the amount to steal that    will be below fraud detection levels.  
    "The server is the brains that does all the transactions in the    bank account," he said. Rather than having the malware residing    on the victim's computer take charge of the attack functions,    like stealing the data and sending it off somewhere, the attack    itself is performed by the server.  
See the article here:
Cybercrime moves to the cloud
Read More..