Trojan malware found to be targeting Indian co-operative banks amid COVID-19

Agencies
May 19, 2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 19,2020

Cybersecurity researchers on Monday warned of a Trojan malware campaign which is targeting India's co-operative banks using COVID-19 as a bait.

Seqrite, the enterprise arm of IT security firm Quick Heal Technologies, detected the new wave of Adwind Java Remote Access Trojan (RAT) campaign.

Researchers at Seqrite warned that if attackers are successful, they can take over the victim's device to steal sensitive data like SWIFT logins and customer details and move laterally to launch large scale cyberattacks and financial frauds.

According to the researchers, the Java RAT campaign starts with a spear-phishing email which claims to have originated from either the Reserve Bank of India or a nationalised bank.

The content of the email refers to COVID-19 guidelines or a financial transaction, with detailed information in an attachment, which is a zip file containing a JAR based malware.

Upon further investigation, researchers at Seqrite found that the JAR based malware is a Remote Access Trojan that can run on any machine which has Java runtime enabled and hence it can impact a variety of endpoints, irrespective of their base operating system.

Once the RAT is installed, the attacker can take over the victim's device, send commands from a remote machine, and spread laterally in the network.

In addition, this malware can also log keystrokes, capture screenshots, download additional payloads, and extract sensitive user information, Seqrite said, adding that such attack campaigns can effectively jeopardise the privacy and security of sensitive data at the co-operative banks and result in large scale attacks and financial frauds.

To prevent such attacks, users need to exercise ample caution and avoid opening attachments and clicking on web links in unsolicited emails.

Banks should also keep their operating systems updated and have a full-fledged security solution installed on all the devices, Seqrite advised.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
June 22,2020

Chennai, Jun 22: Commuting the death sentence to life imprisonment for five convicts, the Madras High Court on Monday set free Chinnasamy, the main convict, who had also been sentenced to death in the Udumalpet Shankar honour killing case.

A Division Bench comprising Justice M. Sathyanarayanan and Justice M. Nirmal Kumar also dismissed the appeal by the state police against the acquittal of three persons by a lower court.

The Bench ordered the five convicts sentenced for life to undergo a jail term of not less than 25 years.

In 2016, V. Shankar, who had married C. Kausalya, was killed by a gang in Udumalpet in Tamil Nadu. The gang also injured Kausalya in the attack.

It was alleged the parents of Kausalya -- Chinnasamy, Annalakshmi -- were against the marriage.

P. Pandidurai, the uncle of Kausalya at the behest of Chinnasamy and Annalakshmi had hired a gang to kill Shankar.

The gang killed Shankar in broad daylight in a public place and Kausalya too got injured in the attack as she tried to save her husband.

The Principal District and Sessions Court in Tiruppur had convicted and sentenced to death six accused persons -- Chinnasamy, P. Jagadeesan, P. Selvakumar, M. Manikandan, M. Mathan alias Michael and P. Kalaithamilvaanan.

The court also sentenced two other accused, K. Dhanraj for life and Manikandan to a five year jail term, while acquitting Annalakshmi, Pandidurai and Prasanna.

The convicts had filed an appeal against their sentence in the Madras High Court while the police filed an appeal against the acquittal of three persons.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 7,2020

New Delhi, Mar 7: The Union government has issued a Global Invite for Expression of Interest for disinvestment in Bharat Petroleum Corporation Limited (BPCL) from prospective bidders with a minimum net worth of $10 billion as of Saturday.

The EoI submissions can be made till May 2, whereas investor queries will be entertained till April 4.

Another condition pertains to a maximum of four members are permitted in a consortium, and the lead member must hold 40 per cent in proportion. Other members of the consortium must have a minimum $1 billion net worth.

The EOI allows changes in the consortium within 45 days, though the lead member cannot be changed.

The GoI proposes to disinvest its entire shareholding in BPCL comprising 1,14,91,83,592 equity shares held through the Ministry of Petroleum and Natural Gas, which constitutes 52.98 per cent of BPCL's equity share capital, along with the transfer of management control to the strategic buyer (except BPCL's equity shareholding of 61.65 per cent in Numaligarh Refinery Limited (NRL) and management control thereon).

The shareholding of BPCL in NRL will be transferred to a Central Public Sector Enterprise operating in the oil and gas sector under the Ministry and accordingly is not a part of the proposed transaction.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.