A banking trojan, known for its small size but powerful capabilities, has expanded the number of financial institutions it can collect data from, according to security vendor Avast.Tiny Banker, also known as Tinba, was discovered around mid-2012 after it infected thousands of computers in Turkey.The malware is just 20K in size and can inject HTML fields into websites when it detects a user has navigated to a banking site, asking for a range of sensitive information banks would never request during an online session.A version analyzed by Avast showed Tiny Banker has been customized to target many new financial institutions, many of which are based in the U.S. such as Wells Fargo, Bank of America and Chase, wrote Jaromir Horejsi, an Avast malware analyst. A screenshot bearing Wells Fargo’s logo showed how Tiny Banker asks for more information when a person logs into their account. It shows a bogus warning about a system update, asking users to provider more information to verify their identity.The requested information includes a card number, expiration date, the three digit security code on the back of a card, a person’s address, Social Security number, date of birth, mother’s maiden name and driver’s license number and its expiration. Tiny Banker has now been seen distributed by the Rig exploit kit, Horejsi wrote. Exploit kits are packages of software planted on websites that attack visitors’ computers, looking for software vulnerabilities and delivering malware if one is found.The revisions to Tiny Banker comes after its source code was leaked in early July, which may have seen it embraced by cybercriminals who could use it without paying for it, as many such programs are sold.Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe