{"id":4661,"date":"2012-12-11T22:00:00","date_gmt":"2012-12-11T22:00:00","guid":{"rendered":"https:\/\/leap.staging.ribbitt.com\/evs\/new-trojan-trumps-two-factor-authentication\/"},"modified":"2012-12-11T22:00:00","modified_gmt":"2012-12-11T22:00:00","slug":"new-trojan-trumps-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/leap.staging.ribbitt.com\/evs\/insights\/new-trojan-trumps-two-factor-authentication\/","title":{"rendered":"New Trojan Trumps Two-Factor Authentication"},"content":{"rendered":"<p><!--StartFragment--><\/p>\n<p>The newly discovered Trojan, Eurograbber, is making news for&#13;<br \/>\nmore than just being a Trojan that attacks <a href=\"http:\/\/www.bankinfosecurity.com\/interviews\/new-trojan-exploits-mobile-channel-i-1730\">mobile&#13;<br \/>\nchannels<\/a>. Cyber thieves have created this Trojan in a way that first&#13;<br \/>\nattacks a victims PC and then moves into their mobile phone when the user&#13;<br \/>\nenters the one-time passcode generated for two-factor authentication. As Darrell&#13;<br \/>\nBurkey discussed in an interview, the most concerning thing about this Trojan&#13;<br \/>\nis the way it was engineered. It was created specifically to attack a certain&#13;<br \/>\ntype of authentication that many banking institutions are now using. This type&#13;<br \/>\nof mal-technology could attack any type of institution and cause a threat to standard&#13;<br \/>\nauthentication measures. Over $47 million US dollars worth of Euros have&#13;<br \/>\nalready been stolen from this lone Trojan. And just because this threat was&#13;<br \/>\ncreated in Europe, does not mean it is contained to only attacking users over&#13;<br \/>\nseas. The attacks originated in Italy and then quickly spread through out&#13;<br \/>\nneighboring countries, targeting Android and Blackberry deceives. <\/p>\n<p>Banks and other institutions, which do not use two-factor&#13;<br \/>\nauthentication, should still heed this warning. Perhaps the most frightening&#13;<br \/>\nthing about this new development is not just the attacks themselves, but the&#13;<br \/>\noverlaying concept clearly illustrating that cyber thieves are adapting. Standard&#13;<br \/>\nand traditional authentication measures will no longer be enough to protect&#13;<br \/>\nagainst identity theft. Companies must learn to fight fire with fire and adopt <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/\">fraud prevention&#13;<br \/>\nmeasures<\/a> that cant be outsmarted by cyber thieves and identity thieves.&#13;<br \/>\nJust as companies have adjusted in the past, it is time that businesses rethink&#13;<br \/>\ntheir fraud prevention strategy. Fraud prevention is not a one-size-fits-all solution and requires revising and reconstruction. Companies that have not&#13;<br \/>\nrethought their fraud prevention in the last few years, even months, may need&#13;<br \/>\nto find a new <a href=\"https:\/\/www.electronicverificationsystems.com\/solutions\/identifraud\/\">identity&#13;<br \/>\nauthentication solutions<\/a> as technology advances. The key is to be three&#13;<br \/>\nsteps ahead of your competition and cyber thieves to prevent and protect&#13;<br \/>\nagainst identity theft.<\/p>\n<\/p>\n<p>[Contributed by EVS Marketing]<\/p>\n<\/p>\n<p><!--EndFragment--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The newly discovered Trojan, Eurograbber, is making news for more than just being a Trojan that attacks mobile channels. Cyber thieves have created this Trojan in a way that first attacks a victims PC and then moves into their mobile<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4661","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":0,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"wp:attachment":[{"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/leap.staging.ribbitt.com\/evs\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}