Automated transfer system (ATS)

From Botnets.fr
Revision as of 15:33, 31 July 2015 by Eric.freyssinet (talk | contribs) (Created page with "{{Feature |Description=Unlike WebInject files that displayed pop-ups to steal victims’ credentials, ATSs remained invisible. These did not prompt the display of pop-ups as w...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

(Feature) Link to the old Wiki page : [1] / Google search: [2] / List of : Features

Description

Unlike WebInject files that displayed pop-ups to steal victims’ credentials, ATSs remained invisible. These did not prompt the display of pop-ups as well as performed several tasks such as checking account balances and conducting wire transfers using the victims’ credentials without alerting them. ATS scripts also modified account balances and hid illegitimate transactions to hide traces of their presence to victims. As long as a system remains infected with an ATS, its user will not be able to see the illegitimate transactions made from his/her accounts. This essentially brings to the fore automated online banking fraud because cybercriminals no longer need user intervention to obtain money.

Botnets

  • As a feature: Gameover
  • As a distribution vector:

Malware

  • As a feature:
  • As a distribution vector:

Exploit kits

  • As a feature:

Services

  • As a feature/service category:

Publications