Vawtrak Banking Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
The sole purpose however is to gain access the bank accounts visited by the compromised device. It uses components of the Pony malware allowing for easier extraction of login details from the browser along with secure keys and anything else they may need to use to get this information.
Infection via phishing has been known to impersonate popular sites like Amazon but put a link to a compromised WordPress website, hidden through the link portion of the HTML code which is used to present a hyperlink within HTML.
Threat updates
| Date | Update |
|---|---|
| 5 Jan 2018 |
Vawtrak is now being offered on the dark web as a ‘Malware-as-a-Service’ where malicious users can rent the capabilities. It has been used in spam campaigns like the original version using Pony infostealer to perform reconnaissance then collecting data of value that. The previous version of Vawtrak targeted banks in Germany, Poland, Japan, the US, Saudi Arabia, UAE, Malaysia, Portugal, Spain, and the UK, but that has changed. Vawtrak version 2 added more countries to target such as Canada, Israel, Romania, the Czech Republic, and the Republic of Ireland, with improvements towards the UK, US, and Japan. |
Remediation advice
To prevent and detect a trojan infection, ensure that:Remediation steps
Last edited: 17 February 2020 12:56 pm