Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Malware

MMPC states a new Trojan Targets SAP Software and Financial Data

Paul Anderson by Paul Anderson
December 6, 2013
in Malware
0
gamker2
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

The Microsoft Malware Protection Center (MMPC)  is warning corporations in regards to a new malware strain dubbed TrojanSpy:Win32/Gamker.A which is targeting SAP software

You might also like

Netwire RAT seized by FBI and other worldwide police agencies

The Emotet botnet returns and is sending a slew of malicious emails

Update-resistant malware infects SonicWall security appliances

SAP with it’s headquarter located in Germany produces business software apps to track and control business operations. Gamker looks to be the very first ever-malware strain developed by crooks targeting SAP but may not be the last.

Part of Gamker code resembles Carberp’s code, the financial stealing bot, source code which was revealed earlier this year, along with the ‘remote control code’.

McDonald said that the bot contains a VNC (virtual network computing) so Gamker possess the ability to control a infected machine remotely. The attacker can initiate a VNC session to get any other particulars to hijack the SAP server and can also hit the SAP server from the contaminated machine.

Gamker contains a keylogging feature which records all ‘keystrokes’ entered into any app operating on a tarnished computer and this aspect has the potential to take all login details like ‘usernames’ and ‘passwords’ that offers those entered in SAP patron apps.

The malware has a thorough list of specific programs for that it also preserves command line parameters and captures screenshots of their task windows.

McDonald included that this is a specific attack on SAP itself and not merely a innocent information gathering process to establish the installation of SAP. The crooks are using execution of SAP component ‘saplogon.exe’ to initialize footage of the disagreements of command line passed into it together with ten screenshots to the ‘C7C server’.

MMPC declares that the fact that this Trojan is striking businesses instead of individual home-users is suprising.

MMPC urged in its concluding declaration that to minimize the harm on their ‘SAP’ machines by possible attacks, firms must give users the minimum access privilege levels vital to accomplish their works, must use 2FA (two-factor authentication), scan their systems with anti-malware programs, and educate the users.

Tags: GamkermalwaremicrosoftSAPVirtual Network Computing
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Netwire RAT seized by FBI and other worldwide police agencies

by Christi Rogalski
March 16, 2023
0
Netwire RAT seized by FBI and other worldwide police agencies

The FBI, in partnership with several police agencies worldwide, has carried out an international law enforcement operation resulting in the arrest of a suspected administrator of the NetWire...

Read more

The Emotet botnet returns and is sending a slew of malicious emails

by Kyle
March 14, 2023
0
The Emotet botnet returns and is sending a slew of malicious emails

The notorious Emotet botnet, considered one of the biggest threats to internet security, has resurfaced after a prolonged hiatus, armed with new tactics. The botnet's trademark strategy of...

Read more

Update-resistant malware infects SonicWall security appliances

by Paul Anderson
March 12, 2023
0
Update-resistant malware infects SonicWall security appliances

Researchers have discovered that threat actors linked to the Chinese government are using malware to infect SonicWall's Secure Mobile Access 100, a popular security appliance, which remains active...

Read more

Fake ChatGPT websites are popping up and spreading malware

by Paul Anderson
March 1, 2023 - Updated on March 2, 2023
0
ChatGPT is found spreading malware created in Python

It was only a matter of time before hackers would start using the growing popularity of ChatGPT to spread malware and steal sensitive personal information. Recently, multiple security...

Read more

BlueSky Ransomware Infects KMSAuto Activator users

by Kyle
July 20, 2022 - Updated on July 22, 2022
0
BlueSky Ransomware backdoors KMSAuto activator

A financially motivated threat actor has been discovered spreading a new ransomware strain, dubbed BlueSky. The group is believed to be connected to the Conti ransomware group. CloudSEK's...

Read more
Next Post
Arizona school district data breach impacts millions

Arizona school district data breach impacts millions

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.