Re: [SC-L] Solution for man-in-the-browser

2010-09-13 Thread Rorym Forums
On 11 Sep 2010, at 16:58, "Wall, Kevin" wrote: > On Sep 10, 2010, at 5:34 PM, smurray1 wrote: >> Hello, >> >> I have been discussing an issue with an organization that is having >> an issue with malware on it's customer's clients that is intercepting >> user credentials and using them to crea

Re: [SC-L] Solution for man-in-the-browser

2010-09-13 Thread Jeremy Epstein
Just to echo the other comments - there's already malware out there that handles per-transaction authorization codes and substitutes in its fraudulent transaction for the real one. (If you look at some of the banking thefts against small & medium businesses, that's what's happening.) So this sche

Re: [SC-L] Solution for man-in-the-browser

2010-09-13 Thread jeremy . long
Completely agree with Jim and Kevin. Once the client host is compromised you can't trust the client. On the server the best you can do is monitor for unusual page flows, click rates that are too high (or time to complete a form is too high), monitor for transactions outside of the norm for th

Re: [SC-L] Solution for man-in-the-browser

2010-09-11 Thread Wall, Kevin
On Sep 10, 2010, at 5:34 PM, smurray1 wrote: > Hello, > > I have been discussing an issue with an organization that is having > an issue with malware on it's customer's clients that is intercepting > user credentials and using them to create fraudulent transactions. > (man-in-the-browser type atta

Re: [SC-L] Solution for man-in-the-browser

2010-09-11 Thread James Manico
I do not think this will work. Once your browser is trojaned, it's game over. The Trojan has the capability to just sit in your browser and wait for the user to log in. (Trojans do not need to steal credentials to cause harm). Once the user has logged on, the Trojan can simulate any user activity s

[SC-L] Solution for man-in-the-browser

2010-09-10 Thread smurray1
Hello, I have been discussing an issue with an organization that is having an issue with malware on it's customer's clients that is intercepting user credentials and using them to create fraudulent transactions. (man-in-the-browser type attacks similar to what Zeus and other trojans are capa