The Hacker News
Trojan.Stabuniq geographic distribution by unique IP address
Security researchers from Symantec have identified a new Trojan that appears to be targeting financial institutions. Dubbed Trojan.Stabuniq, the malware has been collecting information from infected systems potentially for the preparation of a more damaging attack.

According to researchers, roughly 40 IP addresses infected with the Stabuniq Trojan, 40% per cent belong to financial institutions who are mostly based in Chicago and New York.

Cybersecurity

The malware appears to be spread by a phishing attack through spam e-mail containing a link to the address of a server hosting a Web exploit toolkit. Such toolkits are commonly used to silently install malware on Web users' computers by exploiting vulnerabilities in outdated browser plug-ins like Flash Player, Adobe Reader, or Java.

These attacks can be very simple, such as a written email from a prince in Nigeria asking for bank account information.

Once installed, it collects information including its computer name, IP address, operating system version and installed service packs, running processes and dumps that data to a command & control server located at:
  • anatwriteromist.com
  • bbcnews192.com
  • belsaw920.com
  • benhomelandefit.com
  • midfielderguin.com
  • prominentpirsa.com
  • sovereutilizeignty.com
  • yolanda911.com
Recommended actions for readers, Use a firewall to block all incoming connections from the Internet to services that should not be publicly available. By default, you should deny all incoming connections and only allow services you explicitly want to offer to the outside world.

Ensure that programs and users of the computer use the lowest level of privileges necessary to complete a task. When prompted for a root or UAC password, ensure that the program asking for administration-level access is a legitimate application.

Turn off and remove unnecessary services and Enforce a password policy. Stay tuned to +The Hacker News .

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.