{"id":15155,"date":"2016-09-02T14:18:21","date_gmt":"2016-09-02T14:18:21","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5965"},"modified":"2020-04-10T15:06:10","modified_gmt":"2020-04-10T19:06:10","slug":"mitb-patent","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/mitb-patent\/15155\/","title":{"rendered":"MitB protection: No unauthorized entry"},"content":{"rendered":"<p>Kaspersky Lab has received a new patent, this time for a method of countering financial cybercrime. The technology enables detection of HTML code injection into a page opened by the client\u2019s browser (a man-in-the-browser attack). The technology\u2019s principle is based on using special Web pages that provoke malware to manifest itself.<\/p>\n<p>Here\u2019s how it works: The creators of financial malware often tune their code to specific banks such that when a client tries to open the bank\u2019s site, the malware detects it and changes the page displayed in the browser as it loads. It modifies the appearance of various Web page elements (such as the input fields) and steals the entered login credentials or changes account numbers so that the user transfers money to other accounts.<\/p>\n<p>Any attempt to inject HTML code into a Web page indicates that a user\u2019s device is almost certainly infected. If it detects such an attempt, a bank can block the transaction in time and prevent the client\u2019s money from being stolen. Given that the man-in-the-browser technology is implemented in almost every family of banking Trojans, its presence may serve as a true infection indicator for the online banking security solution.<\/p>\n<p>Of course, it\u2019s not quite that simple. What if a device is infected, but the malware is tuned to another bank? In that case, if you go to one bank\u2019s site, the malware will not try to make changes to the page and manifest itself.<\/p>\n<p>So: What then? Isn\u2019t that the other bank\u2019s problem? We don\u2019t like that way of thinking. Most financial Trojans use several tools to steal banking credentials. The malware may not change the displayed page, but it can still log all of the victim\u2019s keyboard input or take other malicious actions.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Given that the MitB is implemented in almost every family of banking Trojans, it may serve as an infection indicator<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F8gog&amp;text=Given+that+the+MitB+is+implemented+in+almost+every+family+of+banking+Trojans%2C+it+may+serve+as+an+infection+indicator\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>That is why we decided to create a kind of a honeypot \u2014 a banking page that features traits of the websites of many various financial institutions (fragments of HTML code specific to the pages of banks and payment systems). If an infected device reaches the site, the malware mistakes it for a real bank\u2019s website and tries to exploit the man-in-the-browser method. It makes those changes and is immediately detected by our system.<\/p>\n<p>The Kaspersky Clientless Engine uses this technology to protect customers\u2019 accounts from attacks by infected devices. You can find more information about Kaspersky Clientless Engine and the Kaspersky Fraud Prevention platform <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/fraud-prevention?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a><u><\/u>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We have received a new patent for a method of countering code injection into a page opened by the client\u2019s browser (a man-in-the-browser attack).<\/p>\n","protected":false},"author":2291,"featured_media":15348,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[573,1091,552,2117,2444,321],"class_list":{"0":"post-15155","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersec","10":"tag-it","11":"tag-kaspersky-fraud-prevention","12":"tag-online-banking-security","13":"tag-patent","14":"tag-technology"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/mitb-patent\/15155\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/mitb-patent\/15057\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/mitb-patent\/15155\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/mitb-patent\/15155\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/cybersec\/","name":"Cybersec"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15155","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2291"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=15155"}],"version-history":[{"count":7,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15155\/revisions"}],"predecessor-version":[{"id":34819,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/15155\/revisions\/34819"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15348"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=15155"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=15155"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=15155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}