GozNym is a spyware program in deployment against prominent financial institutions, such as banks currently. This threat combines code from two previous Trojans while delivering itself through specially-crafted e-mail content. Because malware experts have rated GozNym as a sophisticated, high-level threat with the potential for collecting data, PC users should protect their machines by using dedicated anti-malware tools for deleting GozNym infections, rather than trying to detect this threat by eye.
What Two Trojans can do When They Come Together
Although threat developers may recycle code from old threats to spawn new ones, in most cases, the recycled elements are parts of similar families, such as two types of backdoor Trojans. GozNym is a unique project where its developers chose to borrow the code from two completely disparate threats: the Nymaim and the Gozi ISFB spyware. The ready availability of the source codes for both of these threats has allowed con artists to launch a brand-new campaign with old technology, leveraging it against financial entities.
Although the Nymaim Ransomware was famous for using variants of the Blackhole Exploit Kit for delivering itself, GozNym uses a targeted, e-mail infection vector. Included file attachments may possess embedded macro exploits that, when launched, start a classic Trojan installation routine. GozNym does borrow in-memory persistence and general stealth features from the Nymaim Ransomware, although GozNym doesn't make any attempt to ransom the PC or its files.
GozNym's primary attacks owe more to Gozi ISFB than to the other family. It may use well-known Web-injecting techniques for collecting information from your Web browser, including passwords, login names, and other, protected data. GozNym also may use the same mechanisms to initiate fraudulent money transfers, when appropriate.
Severing a Double Threat from a Bank's Accounts
Both Gozi ISFB and the Nymaim Ransomware are significant, albeit relatively old, threats that can be threatening to any infected PC. However, the selective addition of code from one threat to the other one has made GozNym an even more potent Trojan than any of its predecessors. Although GozNym does not lock your desktop or otherwise impede essential operating activities, GozNym does target and collect business and other information with a high level of efficiency and persistence. Perhaps the best measure of the success of this threat design model is the fiscal results of the GozNym's campaign, which, in less than a month, is already responsible for an estimated four million USD in losses.
The GozNym campaign specializes in targeting businesses that include banks, credit unions and Web commerce companies. Its delivery method is, perhaps, the greatest weak point in its attacks, which requires victims opening documents and then enabling macros (which, as a secure measure, are disabled by default) manually. Any anti-malware scan by competent PC security tools should detect the document's being a Trojan dropper. However, such campaigns may use e-mail messages that include information specific to the target to increase the chances of success.
Besides the potential for minor changes in memory usage, GozNym shows no symptoms. Malware experts can only advise using anti-malware products for finding and uninstalling GozNym, which may include additional components with reinstall capabilities.
Use SpyHunter to Detect and Remove PC Threats
If you are concerned that malware or PC threats similar to GozNym may have infected your computer, we recommend you start an in-depth system scan with SpyHunter. SpyHunter is an advanced malware protection and remediation application that offers subscribers a comprehensive method for protecting PCs from malware, in addition to providing one-on-one technical support service.
Why can't I open any program including SpyHunter? You may have a malware file running in memory that kills any programs that you try to launch on your PC. Tip: Download SpyHunter from a clean computer, copy it to a USB thumb drive, DVD or CD, then install it on the infected PC and run SpyHunter's malware scanner.