Microsoft says German speakers are being targeted by a new variant of a powerful type of malware that steals online banking credentials.
The malware, called Emotet, was spotted around last June by security vendors. It is notable for its ability to sniff out credentials sent over encrypted HTTPS connections by tapping into eight network APIs, according to a writeup from Trend Micro from last year.
Microsoft has been observing a new variant, Trojan:Win32/Emotet.C, which was sent out as part of a spam campaign that peaked in November targeting mostly German-speaking users, wrote HeungSoo Kang of Microsoft's Malware Protection Center.
Emotet is distributed through spam messages, which either contain a link to a website hosting the malware or a PDF document icon that is actually the malware.
The spam messages try to gain the attention of potential victims by purporting to be some sort of claim, a phone bill, an invoice from a bank or a message from PayPal.
Spam messages containing Emotet can be tricky to filter because the messages originate from real email accounts, Kang wrote. One technique to stop spam messages is to reject messages that come from bogus accounts by checking if the account really exists.
Emotet comes with a list of banks and services it is designed to steal credentials from. It will also pull credentials from a variety of email programs, including versions of Microsoft's Outlook, Mozilla's Thunderbird and instant messaging programs such as Yahoo Messenger and Windows Live Messenger.
The stolen information is sent back to Emotet's "command and control (C&C) server where it is used by other components to send spam emails to spread the threat," Kang wrote.
Send news tips and comments to firstname.lastname@example.org. Follow me on Twitter: @jeremy_kirk
Join the CIO New Zealand group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.