"All that glitters is not gold" The prodigious Shylock man-in-the-browser (MitB) banking Trojan is still being upgraded as part of a campaign to migrate from its traditional targets in UK financial services to foreign ones, Symantec has reported.Malware platforms are constantly evolving but the new Shylock modules wouldn’t sound out of place on a high-end commercial software product.These include a new DiskSpread utility that allows the Trojan to infect external and USB drives, a plug-in for scraping FTP and other passwords, and something called ‘BackSocks’ which turns the compromised PC into a proxy server.Other features include Archiver, a utility for compressing video files so they can be more easily uploaded to a remote server, and a ‘VNC’ facility to give criminals a remote connection to the victim’s computer. There is even MsgSpread, an add-on that gives Shylock a way of spreading itself using Skype connections, a feature that was first noticed in January.Shylock can also load balance, shifting incoming traffic from victims from server to server as demand dictates. What is unusual about Shylock is the extent to which it has favoured attacking a wide range of UK banks since appearing in late 2011. That might or might not explain why every revision of its binaries adds more fragments from the Merchant of Venice – or this could just be a simple way of changing its file signature.Importantly, from roughly last October onwards it started diversifying its aim towards Italy and the US so the national focus could just be a means of exhausting one set of institutions before moving on to less protected targets.“As some financial institutions become less desirable as targets, either due to increased security measures or a lack of high-value business accounts, Shylock is refocusing its attacks on those offering potentially larger returns,” said Symantec. Related content feature Accenture takes an industrialized approach to safeguarding its cloud controls Security was once a hindrance for Accenture developers. But since centralizing the company's compliance controls, the process has never been simpler. By Aimee Chanthadavong Dec 11, 2023 8 mins Compliance Compliance Compliance news analysis LogoFAIL attack can inject malware in the firmware of many computers Researchers have shown how attackers can deliver malicious code into the UEFI of many PCs though BIOS splash screen graphics. By Lucian Constantin Dec 08, 2023 8 mins Malware Vulnerabilities news Google expands minimum security guidelines for third-party vendors Google's updated Minimum Viable Secure Product (MVSP) program offers advice for working with researchers and warns against vendors charging extra for basic security features. By John P. Mello Jr. Dec 08, 2023 4 mins Application Security Supply Chain news New CISO appointments 2023 Keep up with news of CSO, CISO, and other senior security executive appointments. By CSO Staff Dec 08, 2023 28 mins CSO and CISO Careers Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe