Nuclear Bot's author releases its source code publicly for other cybercriminals to use The source code for a new Trojan program that targets banking services has been published online, offering an easy way for unskilled cybercriminals to launch potent malware attacks against users.The Trojan is called Nuclear Bot and first appeared for sale on underground cybercrime forums in early December for $2,500. It can steal and inject information from and into websites opened in Mozilla Firefox, Internet Explorer and Google Chrome and can also open a local proxy or hidden remote desktop service.These are all features commonly seen in banking Trojans, as they’re used by attackers to bypass the security checks of online bank websites to perform fraud. For example, the proxy and remote desktop functionality allows hackers to initiate rogue transactions through the victims’ browsers after they have been tricked into providing the second authentication factor.What’s interesting about Nuclear Bot is the failure of its author to market it properly to other cybercriminals. According to researchers from IBM, who have closely monitored the Trojan’s history, over the course of several months the Nuclear Bot creator broke many of the unwritten rules of the cybercriminal community, which resulted in his losing all credibility and being flagged a scammer. For example, the program’s author did not not provide test versions of the software to forum admins or potential buyers and used different names when advertising the malware on different forums. Even though it did not attract any buyers, the Trojan did turn out to be real and quite potent. And in order to prove his legitimacy as a malware coder, it appears that the Nuclear Bot author took the unusual step of releasing the Trojan’s source code himself.The source code for other banking Trojans, including Zeus, Gozi and Carberp, has been released in the past, but usually as a result of unintentional leaks. Regardless of the reason, whenever something like this happens, it’s never good news for the rest of the internet. “Publicly available source code makes for more malware,” the IBM researchers said in a blog post. “This is often incorporated into existing projects. X-Force researchers noted that NukeBot is likely to see the same process take place in the wild, especially since its code is not copied from other leaked malware, per the developer’s claims.”At the very least, source code availability puts new malware into the hands of cybercriminals who don’t have the resources to build something themselves or to buy a ready-made solution from someone else.“At this time, NukeBot has not been detected in real-world attacks and does not have defined target lists,” the IBM researchers said. “This situation is likely to change in the near future.”Add your comments to our Facebook page. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe