Skip to content
Impact Lab
  • Home
  • Futurati Podcast
  • Futurist Speaker
  • Book Thomas Frey
  • DaVinci Institute
  • Advertise with ImpactLab

Elaborate new computer virus raids your bank account – automatically covers its tracks

Impact Lab > Analysis > Elaborate new computer virus raids your bank account – automatically covers its tracks
Analysis, Big Problems, Internet, Money Talk, Science & Technology News

Malware-financial

A new version of the widely prevalent SpyEye Trojan horse swaps out banking Web pages, preventing account holders from noticing that their money is gone.

Checking your bank accounts diligently is the best way to protect yourself from an online financial scam.  At least, until now.

Israeli-based Security firm Trusteer has found an elaborate new computer virus that not only helps fraudsters steal money from bank accounts — it also covers its tracks.

Think of a crime plot involving a spy who plans to break into a high-security building and begins by swapping out security camera video so guards don’t notice anything is amiss. Known as a surveillance camera hack, the technique has been used in dozens of movies.

A new version of the widely prevalent SpyEye Trojan horse works much the same way, only it swaps out banking Web pages rather than video, preventing account holders from noticing that their money is gone.

The Trojan horse employs a powerful two-step process to commit the electronic crime. First, the virus lies in wait until a customer with an infected computer visits an online banking site, steals their login credentials and tricks the victim into divulging additional personal information such as debit card information. Then, after the stolen card number is used for a fraudulent purchase, the virus intercepts any further visits to the victim’s banking site and scrubs transaction records clean of any fraud. That prevents — or at least delays — consumers from discovering fraud and reporting it to the bank, buying the fraudster critical extra time to complete the crime.

Trusteer calls it a “post transaction” attack, because much of the virus’ effectiveness is attributable to its ability to control what victims see after fraudulent transactions occur. Amit Klein, chief technology officer for Trusteer, said he believes criminals have used the technique for a few months, and it has infected real consumers.

“I predict that the use of post transaction attack technology will significantly increase as it enables criminals to maximize the amount of fraud they can commit using their initial investment in malware toolkits and infection mechanisms,” Klein said.

The new SpyEye came to Trusteer’s attention when a large retail bank in the United States spotted it and shared with the firm, he said.

‘A very scary tactic’
The virus’ evidence-covering techniques are elaborate. First, it keeps track of all fraud committed by the criminal, and makes sure to remove those line items from online transaction lists. It also edits balance amounts to prevent consumers from getting suspicious.

“This is a very scary tactic,” said Avivah Litan, a financial fraud analyst at consulting firm Gartner. “Everybody thinks all they have to do is check their transactions and their balances. That’s not true anymore.”

The new virus technique ups the ante in the cat-and-mouse game between security companies and the computer criminals who try to steal consumers’ money. Consumer reports of fraud are still a very important part of fraud-fighting techniques, Litan said.

“Most banks ‘let the first transaction through,’ because if they stopped everything that was potentially fraud, consumers would get annoyed,” she said. In some cases, fraud-checking tools kick in only after initial reports, so this version of SpyEye could buy criminals important time as they try to turn stolen data into cash.

“Usually they only need one day more to get the money, to push the fraud through,” she said. “They always want to keep the security guys running after them.”

Such cover-your-tracks techniques have been used before by virus writers, Klein said. In a simpler version, criminals who raided online bank accounts and wired money out of them would try to hide the transaction from victims using the same Web page interception trick. But this new flavor has more potential for success, because it involves stolen debit card numbers used at third-party merchants, creating complex transactions involving multiple banks and multiple security systems.

Victim account holders who check their balance at an ATM — or even at a second uninfected computer — would be able to spot the fraudulent transactions. The virus doesn’t impact bank systems, merely the characters that are displayed within the infected system’s Web browser. That means paper statements would reveal the fraud, too.

Of course, consumers who rely on paper statements could be a full 30 days behind when it comes to spotting fraudulent transactions.

While Klein is worried about the “post transaction” attack, he said consumers who have vulnerable Web browsers are bound to be victims of one fraudster or another.

“My take is that if your computer is infected with financial malware, it’s game over anyway,” he said. “My takeaway is you need to prevent getting infected with financial malware in the first place.”

Via The Redtape Chronicles

__________________________________________________________________

udemy-logo-academyofyou-300x228

design user exp 7 steps

Design Your User
Experience in 7
Simple Steps

responsive web 23423423

Creating Responsive
Web Design

Tag: bank account, Criminals, Fraud, malware, money, SpyEye, trojan horse, virus, web browser

Leave a Reply

You must be logged in to post a comment.

Post navigation

Previous post

Doctors in America..

Next post

Dogs have skills..

Thomas Frey Futurist Futurati Podcasts
Book Thomas Frey Futurist
Categories
Recent Posts
  • After Work: What Happens to a Planet That Doesn’t Need Most of Us
  • The Dwindling: How the Workforce Hollows Out
  • Instant Experts — What Robots Are Unnervingly Good At Right Away
  • The First Wave: The Jobs Robots Will Take First
  • The Driverless Revolution Series Part 6: The Daily Life Revolution—How AVs Change Where We Live, Work, and Spend Time
  • The Driverless Revolution Series Part 5: The End of Car Accident Deaths—When 40,000 Annual Fatalities Drop to Zero
  • The Driverless Revolution Series Part 4: Freedom at Last—How AVs Liberate the Elderly, Disabled, and Mobility-Constrained
  • The Driverless Revolution Series Part 3: Children Will Drive Themselves—How AVs Transform Childhood, Parenting, and Independence
  • The Driverless Revolution Series Part 2: The 5 Million Job Extinction—Drivers, Traffic Cops, and the Unemployment Crisis
  • The Driverless Revolution Series Part 1: The Infrastructure Apocalypse—What Happens to Parking Lots, Drive-Thrus, and Gas Stations
  • Maximum Curiosity Part 8 – Living in the Question: The Recursive Frey Paradox
  • Maximum Curiosity Part 7 – Maximum Curiosity in Reverse: What Comes After This?
  • Maximum Curiosity Part 6 – Why Does Anything Exist? When AI Won’t Stop at Physics
  • Maximum Curiosity Part 5 – The Archaeology of Ideas: Tracing Every Thought Back to First Principles
  • Maximum Curiosity Part 4 – The Whole Earth Ownership Project: Who Owned It Before Them?
RSS Recent Posts on FuturistSpeaker.com
  • The Long Game: Legacy, Meaning, and What You Want to Leave Behind March 11, 2026
  • Making Things With Your Hands in a World That Doesn’t Need You To March 11, 2026
  • The Dream That Was Always Yours: Reconnecting With What You Wanted Before Life Got in the Way March 11, 2026
  • The Relationships That Hold: Why Father, Grandfather, Great-Grandfather Still Mean Everything March 11, 2026
  • The Korczak Principle: A New Framework for Purpose in a World That Can Do Everything March 11, 2026
  • You Can’t Automate Purpose March 10, 2026
  • The Prompt That Changed Everything March 9, 2026
  • The Great Transportation Shakeout: When Cars, Drones, and Airlines Collide March 1, 2026
  • The History Camera: How AI Will Show Us What Actually Happened March 1, 2026
  • The Open Road, Reimagined: How Autonomous Teslas Are Rewriting the American Road Trip February 22, 2026
Archives

Copyright 2026 Impact Lab LLC | Impact Lab is owned and operated by Impact Lab LLC.

Discover the Hidden Patterns of Tomorrow with Futurist Thomas Frey
Unlock Your Potential, Ignite Your Success.

By delving into the futuring techniques of Futurist Thomas Frey, you’ll embark on an enlightening journey.

Learn More about this exciting program.