You are here:

Beware of Banking Trojans! They’re Targeting Through Google Cloud

My first design (2)

Hey everyone! Today, we’re diving into something super important that’s been happening in the world of cybersecurity. Have you ever heard of banking trojans? These are nasty pieces of malware that sneak into your computer to steal sensitive information like your banking details. And guess what? They’re making a big splash across Latin America and Europe, all thanks to the help of Google Cloud. Let’s break it down.

What’s Going On?

There’s a significant cybersecurity issue happening right now. Cybercriminals are using banking trojans, a type of malware, to steal sensitive information like banking details. These trojans are being distributed through Google Cloud Run, a service provided by Google.

Three specific banking trojans, namely Astaroth (aka Guildma), Mekotio, and Ousaban, are being used in these attacks. They initially targeted Latin America but have now extended their reach to Europe and North America.

The criminals are using Google Cloud Run to host malicious websites or services. Victims are tricked into clicking on these through phishing attacks, which then lead to the installation of the malicious payload.

This is a serious threat, and it’s important to stay vigilant. Always be cautious when clicking on links, especially those that appear in unsolicited emails. Use reliable security software and keep it updated. Regularly backup your data and educate yourself about the latest threats. 

.

How Does It Work?

These cybercriminals start by sending phishing emails. Phishing is when you get an email that looks legit, but it’s actually a trap. Clicking on a link in one of these emails might install something harmful without you even knowing. In this case, the harmful stuff is malicious software hidden inside Microsoft Installer files (MSIs). These files act like Trojan horses, dropping the real malware into your system.

Banking trojans operate in a few steps:

  1. Distribution: The first step is distribution. The cybercriminals distribute the trojans using various methods, one of which is phishing. They send out emails or messages that appear to be from a legitimate source, tricking victims into clicking on a link.
  2. Infiltration: The link leads to a malicious service hosted on Google Cloud Run. When the victim clicks on the link, the trojan is downloaded onto their device.
  3. Installation: Once on the device, the trojan installs itself. It often disguises itself as a legitimate program or file to avoid detection.
  4. Data Harvesting: After installation, the trojan begins its main task – stealing sensitive information. It can log keystrokes to capture passwords, take screenshots, and access files and documents. The primary target is often banking details, but any sensitive information is valuable.
  5. Data Transmission: The harvested data is then sent back to the cybercriminals. They can use this information for various illegal activities, including identity theft and financial fraud.

Why Google Cloud Run?

Google Cloud Run has become an attractive platform for cybercriminals for a few reasons:

  1. Cost-Effectiveness: Google Cloud Run is a cost-efficient platform, which makes it appealing for cybercriminals who want to maximize their resources.
  2. Ability to Bypass Security Measures: Google Cloud Run has the ability to bypass standard security blocks and filters. This makes it easier for cybercriminals to carry out their activities without being detected.
  3. Ease of Use: Google Cloud Run allows customers to manage workloads and launch front-end and back-end services, websites, and apps without having to worry about scaling or maintaining an infrastructure. This ease of use is also beneficial for cybercriminals who want to quickly and easily set up malicious services.

A History of Cloud Abuse

Cloud abuse has been a recurring issue in the field of cybersecurity. Here’s a brief history and explanation:

  1. Early Days: The concept of cloud computing was introduced in 1961 by John McCarthy, who proposed that computing could be sold as a utility, like water and electricity. As cloud services developed and became more popular, they also became targets for abus2.
  2. Spam and Phishing: If a cloud service offers a messaging system, it’s almost inevitable that someone will use it for spamming and phishing. This is as old as the first scam on the Internet.
  3. Free Compute Abuse: Free compute services are often exploited for malicious activities. For example, cybercriminals have been known to use these services for crypto mining.
  4. Hosting Malicious Content: Once cloud services are compromised, they can be used to host malicious content, including everything from phishing pages to spam bots.
  5. Blended Threats: Some abusers are “blended threats” who have multiple goals and sometimes look to achieve them at the same time. This makes them difficult to categorize, and stopping one campaign does not mean that they have left the cloud platform.
  6. Cross-Platform Abuse: Some abusers spread their efforts across multiple platform providers to make detection more difficult.

The Bigger Picture

This issue isn’t isolated. Other phishing campaigns are also spreading malware like DCRat, Remcos RAT, and DarkVNC, which can steal data and control infected computers.

  1. DCRat (Dark Crystal RAT): This is a modular remote access trojan (RAT) that was first observed in 2018. It has received continuous updates and new modules from its original developer and third-party affiliates. It’s designed to steal sensitive information such as banking details.
  2. Remcos RAT: Remcos is another RAT that attackers use to perform actions on infected machines remotely. This malware is extremely actively kept up-to-date with updates coming out almost every single month.
  3. DarkVNC: DarkVNC is a hacking tool available for purchase online. It can be used as a Virtual Network Computing service, which means that the attackers can get full access to the targeted system via this malware.
  4. Rhadamanthys: This is a new and advanced Malware-as-a-Service (MaaS) information stealer known as Rhadamanthys Stealer. It’s being used in a sophisticated phishing campaign targeting the oil and gas sector.

So, What Can We Do?

First off, being aware is key. Understanding that these threats exist and knowing how they work is the first step in protecting yourself. Here are a few quick tips:

  • Be cautious with emails, especially those from unknown senders. If an email looks suspicious or too good to be true, it probably is.
  • Don’t click on links or download attachments from emails you weren’t expecting.
  • Keep your software updated. Regular updates often include security patches.
  • Use reputable antivirus software to help detect and block malware.

Wrapping Up

The rise of banking trojans leveraging Google Cloud to spread across Latin America and Europe is a stark reminder of the evolving threat landscape in cybersecurity. By staying informed and practicing good online hygiene, we can protect ourselves from these and other cybersecurity threats. Let’s stay safe out there!

At Maagsoft Inc, we are your trusted partner in the ever-evolving realms of cybersecurity, AI innovation, and cloud engineering. Our mission is to empower individuals and organizations with cutting-edge services, training, and AI-driven solutions. Contact us at contact@maagsoft.com to embark on a journey towards fortified digital resilience and technological excellence.