{"id":6898,"date":"2016-03-11T10:52:41","date_gmt":"2016-03-11T15:52:41","guid":{"rendered":"https:\/\/kasperskydaily.com\/uk\/?p=6898"},"modified":"2019-11-22T10:11:08","modified_gmt":"2019-11-22T10:11:08","slug":"banking-trojans-bypass-2fa","status":"publish","type":"post","link":"https:\/\/www.kaspersky.co.uk\/blog\/banking-trojans-bypass-2fa\/6898\/","title":{"rendered":"How banking Trojans bypass two-factor authentication"},"content":{"rendered":"<p>Two-factor authentication via\u00a0SMS is widely used by banks. Of course, this measure works better than a mere password but it\u2019s not impenetrable. Security specialists <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2005\/03\/the_failure_of.html\" target=\"_blank\" rel=\"noopener nofollow\">found<\/a>\u00a0it could be fooled 10 years ago, just when this type of protection was gaining popularity.<\/p>\n<p>Sadly, so have malware creators. That\u2019s why banking Trojan developers are able to breach one-time SMS passwords with ease. Here is how it works:<\/p>\n<ol>\n<li>A user launches legitimate banking app on a smartphone.<\/li>\n<li>The trojan detects which app is used, and overlays the legitimate interface with a fake version. \u00a0The key here is that the fake screen looks just like the real one.<\/li>\n<li>The victim enters login and password in the fake app.<\/li>\n<li>The Trojan sends user\u2019s credentials to criminals. They use these data to login into the user\u2019s banking app.<\/li>\n<li>Then the culprits request a financial transaction to their account.<\/li>\n<li>Victim\u2019s phone receives SMS with one-time password.<\/li>\n<li>The Trojan extracts the password from SMS and sends it to cybercriminals.<\/li>\n<li>It also hides the SMS from the user. This is why the victim does not know about ongoing operations until they check their banking account and transactions history.<\/li>\n<li>Criminals use intercepted password to confirm the transaction and receive victim\u2019s money<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">What is two-factor authentication and where should you enable it? <a href=\"http:\/\/t.co\/WSvDc9oSvb\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/WSvDc9oSvb<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/passwords?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#passwords<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/privacy?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#privacy<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/security?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#security<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/476019700636614656?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">June 9, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>It\u2019s hardly an exaggeration if we say that \u00a0any &lt;strong&gt;every&lt;\/strong&gt; modern banking Trojan knows how to fool SMS-based two-factor authentication systems. In fact malware creators have no other choice: as all banks turn to this protective measure, Trojans need to adapt.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Evolution of <a href=\"https:\/\/twitter.com\/hashtag\/Asacub?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Asacub<\/a> trojan: from small fish to ultimate weapon \u2013 <a href=\"https:\/\/t.co\/lLv0pY4lol\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/lLv0pY4lol<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/infosec?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#infosec<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/mobile?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#mobile<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/banking?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#banking<\/a> <a href=\"https:\/\/t.co\/gAM3zzy7aC\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/gAM3zzy7aC<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/689836995196129281?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 20, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>There are a lot of malicious apps that are able to do it, more than you might think, in fact. During last couple of months alone our experts have posted detailed reports devoted to three different malware families:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/asacub-trojan\/11108\/\" target=\"_blank\" rel=\"noopener nofollow\"> Asacub<\/a> \u2014 a spy app that evolved into a Trojan and learned to steal money from mobile banks.<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/acecard-android-trojan\/11368\/\" target=\"_blank\" rel=\"noopener nofollow\"> Acecard<\/a> \u2014 a very powerful trojan that is able to overlay interfaces of &lt;strong&gt;almost 30 different banking apps&lt;\/strong&gt;.<\/li>\n<li><a href=\"https:\/\/securelist.com\/blog\/research\/74051\/first-step-in-cross-platform-trojan-bankers-from-brazil-done\/\" target=\"_blank\" rel=\"noopener\"> Banloader<\/a> \u2014 a cross-platform Trojan of Brazilian origin, that is able to launch itself on PCs and mobile devices simultaneously.<\/li>\n<\/ol>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/Android?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#Android<\/a> trump card: Acecard <a href=\"https:\/\/t.co\/yHxyACMslU\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/yHxyACMslU<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/banking?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#banking<\/a> <a href=\"https:\/\/t.co\/DmnUAOJvSM\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/DmnUAOJvSM<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/701795013223694341?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">February 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>So you see, whilst it\u2019s a strong addition to your normal security, if you have malware on your phone or PC, there\u2019s a good chance that it won\u2019t protect your details. \u00a0A good\u00a0basic rule that helps is to install apps only from official stores, however even that\u2019s not 100% certain as some malware made it into the official\u00a0<a href=\"http:\/\/www.dailydot.com\/politics\/google-android-app-virus-mapin\/\" target=\"_blank\" rel=\"noopener nofollow\">Play Store<\/a>\u00a0and even\u00a0Apple\u2019s\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/xcodeghost-compromises-apps-in-app-store\/9965\/\" target=\"_blank\" rel=\"noopener nofollow\">App Store<\/a>.<\/p>\n<p>This is why the most reliable solution is to install a good mobile antivirus. You can start with the basic version of <a href=\"http:\/\/app.appsflyer.com\/com.kms.free?pid=smm&amp;c=kd-ru\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security<\/a>. It\u2019s free, though you\u2019ll need to scan devices manually from time to time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you sure that one-time SMS passwords reliably protect your mobile bank? Think again! In this article we explain how Trojans fool two-factor authentication.<\/p>\n","protected":false},"author":421,"featured_media":6899,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2026,9],"tags":[2412,1111,105,109,711,1061,1361,434,192,97,46,131],"class_list":{"0":"post-6898","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-advice","10":"tag-2fa","11":"tag-android","12":"tag-apps","13":"tag-banking-trojans","14":"tag-finance","15":"tag-mobile-banking","16":"tag-mobile-devices","17":"tag-protection","18":"tag-security-2","19":"tag-sms","20":"tag-tips"},"hreflang":[{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/banking-trojans-bypass-2fa\/6898\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/5363\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/3750\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/6849\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/6818\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/banking-trojans-bypass-2fa\/7914\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/banking-trojans-bypass-2fa\/7695\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/banking-trojans-bypass-2fa\/11172\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/banking-trojans-bypass-2fa\/11545\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/banking-trojans-bypass-2fa\/6090\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/banking-trojans-bypass-2fa\/7215\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/banking-trojans-bypass-2fa\/10717\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/banking-trojans-bypass-2fa\/11172\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/banking-trojans-bypass-2fa\/11545\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/banking-trojans-bypass-2fa\/11545\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.co.uk\/blog\/tag\/2fa\/","name":"2FA"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6898","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/users\/421"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6898"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6898\/revisions"}],"predecessor-version":[{"id":17771,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6898\/revisions\/17771"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media\/6899"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}