The Latest in IT Security

SpyEye Behind Cyber-fraud


SpyEye is now very well known within all security communities and security blogs of the world.
The latest version of the SpyEye tool includes very powerful capabilities, specifically designed to steal sensitive data from Windows users conducting monetary transactions over the Internet.

The Trojan tool is sold on the underground market and in cybercrime forums to be used by cybercriminals.
Designed to defeat the security defenses in place by online banks, the SpyEye Trojan renders these security systems useless. If people are infected by this Trojan then their credentials and sensitive data such as, identities, credit card numbers and similar information, are stolen and sent to the criminals waiting to collect this data and enumerate their new budget.

The number of SpyEye kits spread all around the world is unknown, and surely the owners remain silent and active, collecting information to sell, and increasing the business of organized crime.

The Total Defense Research Team was notified of an interesting issue and through a hidden malicious web site we found a SpyEye control panel providing a lot of sensitive information.

Needless to say, this site was password protected and not accessible by everybody, but only by those criminals who have built up the database full of stolen data.

[Figure 1 – SpyEye Control Panel]

The control panel of the SpyEye tool clearly shows a friendly interface to query a hidden database containing the stolen information.

The Credit Card Grabber button is highly visible, with precise and detailed filters which can be provided by the malicious user to focus on particular choices (example: “with CVV only” as indicated in Figure 1).

Though the Total Defense Research Team continually monitors the cybercrime situation and the related cyber-fraud issues in order to deliver proactive defense to our customers, we always recommend having some good security practices in place:

  • Regularly update your Internet Security Suite product
  • Regularly update your Operating System (security patches) and the programs installed
  • Do not install programs that you do not need or add-ons which ask you to install anything: only maintain what is useful for you, the rest can be rejected and/or removed.

Leave a reply



Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...



Latest Comments