Discover ESET

Our vision, values and technology.

Newsroom

Get the latest ESET updates.

Press releases

Company news at your fingertips.

Press contacts

Contact information for media and agencies.

Careers

Build a career with ESET.

ESET’s Latest Banking Malware Discovery Sheds Light on Increasingly Sophisticated Attacks on Finance

Next story

Today, ESET researchers published findings that illustrate how one of the newer cybercrime groups, RTM, has been deploying complex malware based in the Delphi programming language, that targets a type of business software known as Remote Banking Systems (RBS). The software is used to make bulk financial transfers.

The findings, shared in a detailed white paper, explore the deployment of this sophisticated malware against targets in Russia and the surrounding region. The confirmed capabilities, especially in respect to spying, include: smart card reading, keylogging and real-time monitoring of banking-related activities. 

“From our analysis, the malware actively searches for export files common to popular accounting software mainly used in Russia,” explained Jean-Ian Boutin, Malware researcher at ESET. 

According to ESET research these files are likely to be of interest since they can contain details of bulk transfers, an intermediary step in RBS’ execution of payment orders. The criminals have the ability to extract some interesting information from the text files within, namely the recipient account details or the amount transferred, and thus profiting from their activities.

RTM is not the first group to pursue this method of attack. Others like Buhtrap and Corkow have also targeted RBS users in the past, slowly building an understanding of the network and building custom tools to steal from corporate victims.

“The growth in capabilities and methodology of groups like these, which are primarily targeting Russia at the moment, suggests that businesses in other parts of the world, vulnerable to similar attacks, are likely to be their next targets,” continued Boutin. 

To counter these threats, ESET advises all companies, regardless of the sector to employ Core cybersecurity best practices — including ongoing education for employees, implementing tools like two-factor authentication (2FA), encryption, and layered protection for systems and endpoints.

To learn more about RTM’s activities and the tools they use, please refer to our complete white paper. IOCs for this threat can be found on our GitHhub account.

 About ESET

For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security, to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real-time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET becomes the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003. For more information visit www.eset.com or follow us on LinkedInFacebook and Twitter.