The FBI sent out a warning today about an uptick in the use of malware known as Beta Bot that can steal sensitive data such as log-in credentials and financial information.
The FBI says Beta Bot blocks computer users' access to security websites and disables anti-virus programs, leaving computers vulnerable to compromise. Cyber criminals aiming Beta Bot at financial institutions, e-commerce sites, online payment platforms, and social networking.
From the FBI: "Beta Bot infection vectors include an illegitimate but official looking Microsoft Windows message box named "User Account Control" that requests a user's permission to allow the "Windows Command Processor" to modify the user's computer settings. If the user complies with the request, the hackers are able to infiltrate data from the computer. Beta Bot is also spread via USB thumb drives or online via Skype, where it redirects the user to compromised websites.
Although Beta Box masquerades as the "User Account Control" message box, it is also able to perform modifications to a user's computer. If the above pop-up message or a similar prompt appears on your computer and you did not request it or are not making modifications to your system's configuration, do not authorize "Windows Command Processor" to make any changes."
The FBI recommends running a full system scan with up-to-date anti-virus software on the infected computer. If Beta Bot blocks access to security sites, download the latest anti-virus updates or a whole new anti-virus program onto an uninfected computer, save it to a USB drive and load and run it on the infected computer. It is advisable to subsequently re-format the USB drive to remove any traces of the malware, the FBI stated.
RSA's Limor Kessem, Cybercrime and Online Fraud Communications Specialist, wrote about Beta Bot in May saying: "It appears that a much anticipated event has finally transpired in the cybercrime arena, with the release and active sale of a new commercially-available Trojan family that has begun around January this year, circulating under the name Beta Bot. RSA researchers have recently come across samples of this user-mode rootkit, analyzing its behind-the-scenes infrastructure. Beta Bot actually started out as an HTTP bot and not a banking Trojan, but it has since evolved, donned a trigger list, and was repurposed for financial fraud that includes targets such as banks, ecommerce and even Bitcoin wallets.
According to research performed by RSA it was inferred that Beta Bot (alias: Troj/Neurevt-A) is not the creation of an amateur. The malware is a persistent Ring-3 rootkit with layers of anti-security protection (such as not executing within virtual machines, thus avoiding sandboxes), AV-disabling features, and even a DNS redirecting scheme to isolate bots from security-themed online resources, including RSA's official website."
Check out these other hot stories: