Researchers intercept Tatanga malware bypassing SMS based transaction authorization

JMH

Emeritus, Contributor
Joined
Apr 2, 2012
Posts
7,197
Security researchers from Trusteer have intercepted a Tatanga malware variant capable of bypassing the SMS based transaction authentication protection of German banks.

Here’s how it works:

The scam targets online banking customers of several German banks. When the victim logs on to the online banking application, Tatanga uses a MitB webinject that alleges the bank is performing a security check on their computer and ability to receive a Transaction Authorization Number (TAN) on their mobile device.In the background, Tatanga initiates a fraudulent money transfer to a mule account. It even checks the victim’s account balance, and will transfer funds from the account with the highest balance if there is more than one to choose from.
The victim is asked to enter the SMS-delivered TAN they receive from the bank into the fake web form, as a way to complete this security process. By entering the TAN in the injected HTML page the victim is in fact approving the fraudulent transaction originated by Tatanga against their account.
http://www.zdnet.com/blog/security/...ing-sms-based-transaction-authorization/12280
 

Has Sysnative Forums helped you? Please consider donating to help us support the site!

Back
Top