Spyeye Trojan Attacks Airline Website That Accepts Bank Debit Card Payments

(PresseBox) ( London, )
Trusteer have uncovered a SpyEye configuration that targets users of two leading European airline travel Web sites: Air Berlin, the second largest airline in Germany (after Lufthansa) and AirPlus, the global provider of business travel services for companies. SpyEye exploits the user's machine, not the websites, to carry out this fraud.

According to Amit Klein, CTO of Trusteer, "The attack subjects are far from randomly selected, but are, we believe, carefully chosen for their criminal revenue potential. One site accepts debit card payments, while the other caters to business users."

Air Berlin, now Europe's sixth-largest airline, not only accepts debit and credit cards, but for Austrian, Dutch and German citizens, allows travellers to pay by bank direct debit seven days before travelling.

"This means that criminals targeting an Air Berlin traveller from these countries stand a good chance of obtaining the personal details of the user - including their date of birth, which is mandatory on the airline's site - as well as their bank account details," Klein continued.

Air Plus, meanwhile, offers a variety of travel services for companies of all sizes via their website, all paid for by business payment cards, which are invariably linked to business bank accounts.

Since corporate accounts tend to carry much higher balances (or credit limits) than consumer accounts, they have much greater cybercriminal revenue potential from a data harvesting perspective.

"In the case of the Air Berlin attack, SpyEye is attempting to harvest confidential user information including username and password, and other data that is entered in the targeted web page. Since Air Berlin accepts bank debit card payments, the fraud potential is even more elevated," he said.

The injection code of SpyEye captures the information on username and password details: for more information see http://www.trusteer.com/blog/spyeye-trojan-targets-airline-website-accepts-bank-debit-card-payments

The AirPlus attack methodology, meanwhile, targets users of the Lufthansa Miles & More Visa credit card which offers bonus travel for purchases made using the card.

Similar to the Air Berlin attack, the SpyEye code targets the main login URL of the AirPlus portal:

In this instance, SpyEye injects code into the users' Web browser that claims to be an anti-fraud enhancement to the online:

In reality, of course, this is a cleverly-disguised attempt to phish user credentials from the unsuspecting customer of the AirPlus Web portal.

These credentials are quite comprehensive and include the card name and number, expiration date, CVV (signature strip) number and - as with the Air Berlin attack - the user's date of birth.

The harvesting of the user's date of birth opens up the possibility of identity theft and - Trusteer have observed - committing fraud by impersonating the user and using social engineering attack methods (is this referring to a recent blog?)


It is important to understand that cybercrime is now highly organised, with specialisation of duties between different members of the criminal hierarchy.

This means that the darkware coding gangs behind these variants of SpyEye are now carefully choosing their targets for maximum revenue yield with minimal effort.

In addition, by enhancing the fraudulent data yield from each victim, the possibilities for resale of data go way beyond that of the carder forums seen in the last few years.

Trusteer believe that the cybercriminal gang(s) behind these attacks are almost certainly using a semi-automated methodology of code development, allowing them to develop customised versions of the malware for specific purposes.

Clearly the travel trade offers cybercriminals access to user and company account credentials with larger-than-normal account balances and credit card limits.

The additional fraud sweetener of also gaining access to Air Berlin bank account details in Austria, Germany and the Netherlands is an indication of targeting ingenuity.

Unfortunately, traditional antivirus security mechanisms are largely unable to protect corporate users from becoming infected with SpyEye as it uses targeted reconnaissance combined with signature detection evasion techniques to get a foothold inside computers.

Amit Klein concludes, "A better alternative for protecting web based services is to implement secure web access. For example, browser-based security tools that secure communication between the computer and cloud service provider website can prevent common attack methods like HTML injection and keylogging from grabbing data. These same technologies can be used to protect other browser-based applications like VPNs, CRM, retail, financial and collaboration systems that can be exploited by malware to steal user credentials and breach an enterprise's security perimeter completely undetected. Trusteer expect to see more specialised versions of SpyEye shortly."

For more information see http://www.trusteer.com/blog
The publisher indicated in each case is solely responsible for the press releases above, the event or job offer displayed, and the image and sound material used (see company info when clicking on image/message title or company info right column). As a rule, the publisher is also the author of the press releases and the attached image, sound and information material.
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to service@pressebox.de.