Anonymous web weapon backfires with hidden banking Trojan


Recommended Posts

Anonymous supporters queuing up to participate in denial-of-service attacks are being tricked into installing ZeuS botnet clients.

Hacktivists grabbed what they thought was the Slowloris tool, which is designed to flood websites with open connections and ultimately knock them offline. However, the download included a strain of ZeuS, which promptly installed itself on their Microsoft Windows machines.

The Trojan will carry out the distributed attacks, but that's not all it does - it'll also steal users' online banking credentials, webmail logins, and cookies.

The deception began on 20 January, the same day as the FBI Megaupload raid, Symantec reports.

Malware pedlars swiped the template of an Anonymous guide to launching denial-of-service attacks from Pastebin, modified it to include a link to the nobbled build of Slowloris, and reposted the message on Pastebin to snare victims.

Anonymous is normally highly antagonistic to white-hat security firms, especially Symantec. This time however Twitter accounts maintained by the hacktivist collective were happy to endorse Symantec's warning.

Twit AnonymousIRC wrote: "Anonymous supporters tricked into installing Zeus trojan. This MUSTN'T happen. Be careful what you post and click on!" ?

http://packetstormsecurity.org/news/view/20672/Anonymous-Web-Weapon-Backfires-With-Hidden-Banking-Trojan.html

Link to comment
Share on other sites

Lol damn :rofl:

And now before the incoming posts of how they deserved it, keep in mind that Anonymous also regularly takes down child porn websites. So I guess that's one, if not the only, good thing they have done!

Link to comment
Share on other sites

I wouldn't touch these objectives with a stick knowing the feds have all the means to track and prosecute these individuals.

"IT'S A TRAP!" - Admiral Ackbar

Link to comment
Share on other sites

This topic is now closed to further replies.
  • Recently Browsing   0 members

    • No registered users viewing this page.