Trusteer - SpyEye Attack on Verizon Targets Payment Card Data

 

SpyEye Attack on Verizon Exposes PCI Shortcomings

We recently discovered a configuration of the SpyEye Trojan targeting Verizon’s online billing page and attempting to steal payment card information. The attack took place between May 7th and 13th.  SpyEye uses a technique called “HTML injection” to modify the pages presented in the victim’s browser, in this particular case the injected HTML is used to capture the following credit card related data.  The attack is transparent to Verizon customers since the malware waits for the user to logon and access their billing page and only then injects an authentic-looking replica webpage that requests this information. Since the user has logged on and has navigated to the familiar billing page they have no reason to suspect this request for payment information is fraudulent.

First name, last name
Street address, City, state, zip
Phone number, phone type
Email address
Country of citizenship
Social security number
Date of Birth
Mother’s maiden name
Card number, expiration date and CVV

While this attack is not technically new, it continues a financial malware trend we have been tracking in recent weeks: a shift away from stealing usernames and passwords to stealing payment and credit card data. As I mentioned in last week’s post, this practice allows criminals to commit card non present fraud on the Internet, and also makes it more difficult for banks to identify the source of fraudulent transactions since they cannot be traced back to a specific computer.

Whether it’s on consumer machines, call center computers, or point of sale systems, attackers are targeting endpoints to steal readily available payment card data. This trend is exposing a major shortcoming in the Payment Card Industry Data Security Standard (PCI-DSS), which only requires endpoints to be running anti-virus software. As we have seen, anti-virus software is unable to effectively defend against zero day attacks.

There’s no easy answer, since most endpoints used to enter payment and credit card data are outside the control of the merchants who process the transactions. One model to consider is the path taken by the growing legion of banks that are supplementing backend risk and fraud management systems with end-user education and browser-based security tools.

With the growing incidence of payment and credit card theft targeting the online properties of service providers, merchants, and e-commerce vendors, the payment card industry should take a closer look at endpoints as the emerging “weak link”  in protecting card data against theft and fraud.

###-----------------------------------------------------------------------
This message was sent to editor. If you no longer wish to receive email from us, please follow the link below or copy and paste the entire link into your browser. http://www.xmr3.com/rm/1517061-46807131-2-13-AV1-E70F/pr@itincanada.ca/HCS8371