2012
02.07

[..]

In addition to stealing bank account data, these Ice IX configurations are capturing information on telephone accounts belonging to the victims. This allows attackers to divert calls from the bank intended for their customer to attacker controlled phone numbers. We believe the fraudsters are executing fraudulent transactions using the stolen credentials and redirecting the bank’s post-transaction verification phone calls to professional criminal caller services (discussed in a previous Trusteer blog) that approve the transactions.

[..]

via Malware Redirects Bank Phone Calls to Attackers | Trusteer.

No Comment.

Add Your Comment

*