Difference between revisions of "Automated transfer system (ATS)"

From Botnets.fr
Jump to navigation Jump to search
(Created page with "{{Feature |Description=Unlike WebInject files that displayed pop-ups to steal victims’ credentials, ATSs remained invisible. These did not prompt the display of pop-ups as w...")
 
 
Line 1: Line 1:
{{Feature
{{Feature
|Description=Unlike WebInject files that displayed pop-ups to steal victims’ credentials, ATSs remained invisible. These did not prompt the display of pop-ups as well as performed several tasks such as checking account balances and conducting wire transfers using the victims’ credentials without alerting them. ATS scripts also modified account balances and hid illegitimate transactions to hide traces of their presence to victims. As long as a system remains infected with an ATS, its user will not be able to see the illegitimate transactions made from his/her accounts. This essentially brings to the fore automated online banking fraud because cybercriminals no longer need user intervention to obtain money.
|Description=Adavanced form of banking trojans' toolbox:
* Remain invisible to the user
* Modify account balance / hide illegitimate transactions
* Check balance / Conduct wire transfers
|FeatureCategory=Injections
|FeatureCategory=Injections
}}
}}

Latest revision as of 15:35, 31 July 2015

(Feature) Link to the old Wiki page : [1] / Google search: [2] / List of : Features

Description

Adavanced form of banking trojans' toolbox:

  • Remain invisible to the user
  • Modify account balance / hide illegitimate transactions
  • Check balance / Conduct wire transfers

Botnets

  • As a feature: Gameover
  • As a distribution vector:

Malware

  • As a feature:
  • As a distribution vector:

Exploit kits

  • As a feature:

Services

  • As a feature/service category:

Publications