HACKERS ARE SPREADING the Chthonic banking trojan via legitimate-looking PayPal emails, security outfit Proofpoint has warned.
The emails are 'authentic' and don't trigger antivirus warnings because they come via PayPal from accounts that appear to be legitimate.
"The sender does not appear to be faked. Instead the spam is generated by registering with PayPal (or using stolen accounts) and then using the portal to request money," said Proofpoint in a security advisory.
The attackers take advantage of a feature that allows users to include notes when sending money request messages.
One sample picked up by Proofpoint showed that Gmail failed to block the email since it appeared to be legitimate.
"PayPal's money request feature allows adding a note along with the request [and] the attacker crafted a personalised message and included a malicious URL," said the advisory.
"In a double whammy, the recipient here can fall for the social engineering and lose $100, click on the link and be infected with malware, or both."
"This executable is Chthonic, a variant of the Zeus banking trojan. The command and control for this instance is kingstonevikte[.]com," said Proofpoint.
Intriguingly, perhaps, Chthonic downloads a second-stage payload, a previously undocumented malware known as AZORult which the company is currently investigating.
Fortunately the campaign seems somewhat limited at the moment, according to Proofpoint, perhaps partly owing to the overhead required in opening PayPal accounts or gaining access to compromised accounts.
Google Analytics indicates that the URL of the malicious link, which uses a Goo.gl link, has been clicked only 27 times.
A PayPal spokeserson said in a statement: "PayPal works hard to protect customers and security is a top priority for our company. Based on information we received regarding a possible way to use our request money feature to send spoof or phishing emails, we put additional security protocols in place to safeguard our customers.
"These protocols recently identified some anomalous usage of this feature and we are aware that attempts were made to use the request money feature to distribute malware to a small number of our customers. We have put measures in place in an effort to prevent the misuse of this feature.
"We are continuing to carefully monitor the situation and will reach out to any impacted customers." µ
Bad for shareholders, mildly good for the planet
YouTube on the Tube
Claims that it hasn't ever actually worked
'Instakilla' shared download links for around half the compromised data