IC Mask SemiWiki Webinar Banner
WP_Term Object
(
    [term_id] => 97
    [name] => Security
    [slug] => security
    [term_group] => 0
    [term_taxonomy_id] => 97
    [taxonomy] => category
    [description] => 
    [parent] => 0
    [count] => 298
    [filter] => raw
    [cat_ID] => 97
    [category_count] => 298
    [category_description] => 
    [cat_name] => Security
    [category_nicename] => security
    [category_parent] => 0
)

Floki Bot is Becoming an International Sensation with Cybercriminals

Floki Bot is Becoming an International Sensation with Cybercriminals
by Matthew Rosenquist on 12-22-2016 at 7:00 am

Floki Bot, a new financial oriented malware, is popular with English, Portuguese, and Russian speaking underground criminal markets, winning over cybercriminals with new features and functionality. It is currently being used by a number of different cybercrime groups around the world and is being sold on the dark market for about $1,000 according to Flashpoint and Cisco Talos.

Improvements Abound
Floki Bot is a great example of evolutionary release-reuse tactics of hackers. Based upon the venerable Zeus Trojan 2.0.8.9 source code, which was released many years ago, this new bot variant sports many different technologies to bypass detection and eradication by security tools. It has an updated engine to avoid Deep Packet Inspection (DPI), a method for cybersecurity used to detect malicious software, and extensibility to use The Onion Router (TOR) network for masking network traffic sources. It uses a number of obfuscation techniques to hide its sensitive code. Floki Bot also sports advanced methods to capture data from one of their primary targets, Point-of-Sale (PoS) devices. Overall, it keeps many of the Zeus banking Trojan tricks while adding upgrades to stay current with the latest security controls and tactics.

Alternate Engineering
Based upon communication traffic analysis, it is believed that several different parties, possibly of different languages, might have contributed to the creation of this malware. As hackers do collaborate well, the result brings together a capable new malware to the stage. This is becoming more common. Bits of code and various experts working together to develop the next generation of malware.

In some cases, it is not intentional. There are several examples of when Nation States have conducted cyberattacks and other parties intercepted their well-developed code, only to reverse-engineer it, and use the parts they found interesting in their own projects. This is the way of the next generation malware author. They don’t need to know everything themselves. They can leverage a community for assistance and even reuse the best parts of other groups code for maximum effect.


Protections Must Adapt
If Floki Bot is any indication of the evolution for malware, we should expect faster cycles of release for more virulent code and methods. Teamwork will increase as groups work together to monetize efforts and fleece victims in more efficient and creative ways. The cybersecurity industry is not only fighting the malicious technology, but also the people who are innovating and collaborating to undermine the security, safety, and privacy of us all.

Interested in more? Follow me on Twitter (@Matt_Rosenquist), Steemit, and LinkedIn to hear insights and what is going on in cybersecurity.

Share this post via:

Comments

There are no comments yet.

You must register or log in to view/post comments.