Cyber criminals have stolen more than half a million euros from accounts of a major European bank, which was discovered by the experts at Kaspersky Lab’s global research and analysis team.

Through the inspection of the server used by the attackers, the experts found evidence of a targeted attack against 190 clients of a large European bank, mostly from Italy and Turkey.

Kaspersky Lab’s experts detected a C&C server on the net whose control panel indicated evidence of a Trojan program used to steal money from clients’ bank accounts.

Further, the experts also detected transaction logs on the server, containing information about money taken from specific accounts. The money stolen from each bank account ranged between €1,700 to €39,000.

The campaign was at least one week old when the C&C was discovered, having started no later than 13 January 2014.

Kaspersky Lab principal security researcher Vicente Diaz said, "Soon after we detected this C&C server, we contacted the bank’s security service and the law enforcement agencies, and submitted all our evidence to them."

How well do you really know your competitors?

Access the most comprehensive Company Profiles on the market, powered by GlobalData. Save hours of research. Gain competitive edge.

Company Profile – free sample

Thank you!

Your download email will arrive shortly

Not ready to buy yet? Download a free sample

We are confident about the unique quality of our Company Profiles. However, we want you to make the most beneficial decision for your business, so we offer a free sample that you can download by submitting the below form

By GlobalData
Visit our Privacy Policy for more information about our services, how we may use, process and share your personal data, including information of your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.

"On the C&C server we detected there was no information as to which specific malware program was used in this campaign.

"However, many existing Zeus variations (Citadel, SpyEye, IceIX, etc.) – have that necessary capability. We believe the malware used in this campaign could be a Zeus flavor using Vicente Diaz.sophisticated web injects on the victims," Diaz added.