Development of Injected Code Attacks in Online Banking Fraud Incidents

An exploratory study for understanding the evolution of code used by cyber criminals in financial malware

Master Thesis (2018)
Author(s)

G. Charalambous (TU Delft - Technology, Policy and Management)

Contributor(s)

Carlos Hernandez Ganan – Mentor

Michel Van Van Eeten – Graduation committee member

Tobias Fiebig – Graduation committee member

Faculty
Technology, Policy and Management
Copyright
© 2018 Georgia Charalambous
More Info
expand_more
Publication Year
2018
Language
English
Copyright
© 2018 Georgia Charalambous
Graduation Date
29-08-2018
Awarding Institution
Delft University of Technology
Programme
['Complex Systems Engineering and Management (CoSEM)']
Faculty
Technology, Policy and Management
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The frequency of online banking fraud incidents has increased over the last years. A method used by different cybercriminals is the injection of malicious code into the targeted web pages. For example, attackers might inject an additional piece code into the webpage of a targeted bank asking users to enter extra personal information (e.g., the PIN of the card). By comparing attack instances of web injected code attacks from different malware families an answer will given on how cyber criminals evolve the code of financial malware that is been used in injected code attacks against financial institutions. The contribution of this thesis is to verify the current literature of the existence of code re-use among different code instances using different code similarity tools and to explore how and why the code is evolved.

Files

License info not available