Trojan program steals log-in credentials, other sensitive data from SAP client applications

Attackers can also use the malware to remotely control infected workstations and access SAP servers, Microsoft researchers said

By Lucian Constantin, IDG News Service |  Enterprise Software

A recently discovered malicious program steals log-in passwords and other sensitive information from SAP client applications and allows cybercriminals to access SAP servers from infected workstations.

Researchers from ERPScan, a company that develops SAP security scanning products, revealed at the RSA Europe security conference in October that a new malware program scans infected computers for the presence of SAP applications, possibly in preparation for future attacks.

Researchers from Microsoft recently analyzed the same malware, which they named TrojanSpy:Win32/Gamker.A, and found that it does more than just basic reconnaissance.

"This is an attempted attack on SAP and not just a harmless data-gathering operation to determine if SAP is installed," Geoff McDonald, a researcher with the Microsoft Malware Protection Center (MMPC), said Wednesday in a blog post. "The attackers are using the execution of the SAP component 'saplogon.exe' to trigger recording of the command-line arguments passed into it, combined with a series of 10 screenshots to the C&C server."

Gamker has a keylogging component that logs all keystrokes entered into any application running on an infected computer. This component can capture log-in credentials like usernames and passwords, including those entered in SAP client applications.

The malware also maintains a large list of specific applications for which it also records command-line parameters and takes screen shots of their active windows.

The list includes saplogon.exe, but also finance-related programs, cryptography tools, VPN clients, Bitcoin wallets and more. The complete list is included in the MMPC blog post, but some examples are rclient.exe (remote administration client), translink.exe (a tool by Western Union), truecrypt.exe and bestcrypt.exe (two encryption applications), openvpn-gui (a graphical user interface for the OpenVPN client).

Gamker shares some code with Carberp, a Russian online banking Trojan program whose source code was leaked online earlier this year, McDonald said. The common part is the Virtual Network Computing (VNC) remote desktop functionality that can be used to remotely control an infected computer.

"It is unclear if there is a larger connection between Gamker and Carberp since the remainder of Gamkers code differs from Carberp's publicly leaked code," the Microsoft researcher said.

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question
randomness