Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Tech
    • Downloads
      • Malwarebytes
      • Exploits
      • Paper Downloads
    • Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

MMPC states a new Trojan Targets SAP Software and Financial Data

Paul Anderson by Paul Anderson
December 6, 2013
in Malware
Reading Time: 2 mins read
0
gamker2
21
SHARES
342
VIEWS
Share on FacebookShare on Twitter

The Microsoft Malware Protection Center (MMPC)  is warning corporations in regards to a new malware strain dubbed TrojanSpy:Win32/Gamker.A which is targeting SAP software

You might also like

Cybersecurity Crisis Hits Ardent Health Services

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

SAP with it’s headquarter located in Germany produces business software apps to track and control business operations. Gamker looks to be the very first ever-malware strain developed by crooks targeting SAP but may not be the last.

Part of Gamker code resembles Carberp’s code, the financial stealing bot, source code which was revealed earlier this year, along with the ‘remote control code’.

McDonald said that the bot contains a VNC (virtual network computing) so Gamker possess the ability to control a infected machine remotely. The attacker can initiate a VNC session to get any other particulars to hijack the SAP server and can also hit the SAP server from the contaminated machine.

Gamker contains a keylogging feature which records all ‘keystrokes’ entered into any app operating on a tarnished computer and this aspect has the potential to take all login details like ‘usernames’ and ‘passwords’ that offers those entered in SAP patron apps.

The malware has a thorough list of specific programs for that it also preserves command line parameters and captures screenshots of their task windows.

McDonald included that this is a specific attack on SAP itself and not merely a innocent information gathering process to establish the installation of SAP. The crooks are using execution of SAP component ‘saplogon.exe’ to initialize footage of the disagreements of command line passed into it together with ten screenshots to the ‘C7C server’.

MMPC declares that the fact that this Trojan is striking businesses instead of individual home-users is suprising.

MMPC urged in its concluding declaration that to minimize the harm on their ‘SAP’ machines by possible attacks, firms must give users the minimum access privilege levels vital to accomplish their works, must use 2FA (two-factor authentication), scan their systems with anti-malware programs, and educate the users.

Tags: GamkermalwaremicrosoftSAPVirtual Network Computing
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the bottom of the page.

Recommended For You

Crisis at Ardent Health: Ransomware attack disrupts operations, forcing patient diversions. The Tennessee-based provider initiates cybersecurity measures.

Cybersecurity Crisis Hits Ardent Health Services

November 27, 2023
State-owned China Energy Engineering Corp (CEEC) hit by Rhysida ransomware; global alert issued. Insights into tactics and impact on #StopRansomware effort

China Energy Giant, CEEC, Falls Victim to Rhysida Ransomware Attack

November 26, 2023

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

November 21, 2023

Boeing Faces Cybersecurity Crisis: Lockbit Ransomware Attack Exposes Sensitive Data Amid Citrix Vulnerability Concerns

November 13, 2023

New Variant of Jupyter Malware On The Rise

November 10, 2023

IBM X-Force Unearths New Gootloader Variant, “GootBot”

November 8, 2023
Next Post
Arizona school district data breach impacts millions

Arizona school district data breach impacts millions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Related News

FBI dismantles IPStorm botnet, arrests Sergei Makinin, ending a 4-year cybercrime spree. A major win against global online threats.

FBI Shuts Down Notorious IPStorm Botnet, Arrests Mastermind Sergei Makinin after Four-Year Cybercrime Spree

November 21, 2023
Researchers Expose Gaza Charity Crypto Scam

Researchers Expose Gaza Charity Crypto Scam

November 20, 2023
Global success: Europol, Czech, and Ukrainian police unite to dismantle a multi-million dollar vishing ring targeting Czech bank customers. Ten arrests made in a joint effort against cybercrime.

Europol and Local Forces Disband Multi-Million Dollar Vishing Ring

November 19, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact us
  • Press
  • Writers
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Contact Us
    • Press
  • Privacy Policy

© 2023 ZeroSecurity, All Rights Reserved.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.