August 14, 2012 By Amit Klein 2 min read

IBM recently discovered a sophisticated man-in-the-browser (MitB) enterprise attack that targets virtual private network (VPN) users at a major international airport hub.

Using the Citadel Trojan, criminals are targeting employees to steal their credentials for accessing internal airport applications. IBM has notified airport officials and the relevant government agencies of this attack. Due to the sensitive nature of these systems, the airport immediately disabled remote employee access through this VPN site; the site is currently down.

VPNs are often used to secure Internet connections between a business’s private network and a remote employee. VPNs provide users with secure remote access to applications and data that reside inside an enterprise’s firewall. However, once an attacker steals a victim’s VPN credentials, they can log in as the authorized user and have unfettered access to the information and resources associated with the account.

Man-in-the-Browser Attacks: Complex and Effective

These types of complex attacks use a combination of form-grabbing and screen-capture technologies to steal the victim’s username, password and the one-time passcode generated by a strong authentication product.

The first part of the attack uses form-grabbing to steal the username and password entered into the login screen. The second part of the attack relies on screen-capture capabilities to take a snapshot of the image presented to the victim by the strong authentication product.

The strong authentication product offers two authentication options: single channel and dual channel. The dual-channel mode sends users a one-time PIN via SMS or a mobile application. The single-channel mode is activated when the user selects the “Get Image” option at login. This prompts the strong authentication product to generate an on-screen CAPTCHA of 10 digits. The user then maps his or her original (static) password to the string of digits in the image to produce the one-time code.

This security measure prevents the form-grabber from capturing the actual static password. This is where the screen-capturing feature in Citadel kicks in. By capturing the image, the attacker uses the permutation of digits, along with the one-time code stolen by the form-grabber, to reproduce the static password.

Not Strong Enough

This is a clever use of form-grabbing and screen-grabbing techniques by attackers. It also demonstrates how enterprises that rely on strong authentication approaches are still at risk from targeted attacks if they lack cyber crime prevention security on endpoint devices.

This is especially true in the case of unmanaged or bring-your-own-device (BYOD) endpoints. Because these mobile devices are exposed to threats that would otherwise be filtered at the enterprise perimeter, they are much more vulnerable to infection from advanced malware like Citadel, Zeus or SpyEye. When an unmanaged, infected device connects to the enterprise via a VPN or some other remote access method, malware can circumvent strong authentication systems, as evidenced by the attack above.

The Citadel malware used in this attack is typically used to execute online banking and other forms of financial fraud. However, this is not the first time IBM has identified and reported on enterprises being targeted by screen-capturing/form-grabbing financial malware. This form of man-in-the-browser attack is especially troubling given the potential impact on air travel security and border control.

2014 Ponemon Study: The Economic Impact of Advanced Persistent Threats (APTs)

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today