Sphinx

Sphinx Description

Type: Trojan

Sphinx is a notorious banking Trojan that is based on the infamous Zeus banking Trojan. The people responsible for Sphinx have increased their operations, creating updates that try to take advantage of the Rio 2016 Olympics to carry out their attacks. This banking Trojan received an update that allows Sphinx to target banks in Brazil, as well as payments using Boleto, undoubtedly a strategy designed to capitalize on the current Olympic Games in Brazil. Sphinx is one of the lesser known Zeus variants that first appeared in 2011. Although the Zeus banking Trojan and its clones are well-known and can be intercepted through conventional PC security measures, Sphinx and other variants of Zeus are still active and responsible for numerous attacks around the world.

Sphinx is a Variant of the Infamous Zeus Trojan

The first variants of Sphinx were used to target banks in the United Kingdom. Russian threat developers who sold Sphinx on the Dark Web for $500 USD in BitCoins created sphinx. Sphinx is one of the countless variants of Zeus that appeared in 2011 when the code for this infamous banking Trojan was made public. Like other Zeus variants, Sphinx creates fake banking Web pages inside victims' web browser to collect the victim's login and credit card information. Sphinx is making news again due to its adaptation to the Brazil Olympics.

Sphinx's 2016 Olympics Edition

Although the original version of Sphinx was targeted on European banks mainly, the newly release update to Sphinx includes configurations that allow it to target the websites of the three most popular Banks in Brazil. Sphinx's newest version also is designed to target a popular money ordering service in Brazil called Boleto. This is undoubtedly a move designed to capitalize on the increased traffic centered around the Rio Olympics. Every time the Olympics roll around (or other important sports events such as the FIFA World Cup), threat developers create variants designed to take advantage of the increased attention these events garner.

Some Details About the Sphinx Attack

Sphinx combines social engineering in its attack. Using several steps in its injection attack, Sphinx can manipulate computer users and even collect authentication codes from compromised card readers. Sphinx can trick computer users into downloading fake mobile apps onto their phones, which will collect transaction codes sent to the bank via SMS. There are several ways in which the Sphinx attack is capitalizing on the attention to Brazil. Sphinx is not the only threat that is modifying its attack. For example, the Panda Banker, a different clone of the Zeus banking Trojan, has also been modified so as to target banks in Brazil.

Currently, about 15 percent of global banking Trojan attacks are caused by Zeus Trojan clones and variants, which at one point was the single most popular banking Trojan in history. One of the features that makes Sphinx unique is that it is immune to several measures used by PC security analysts, including blacklisting and tracking by using some specific tools. Sphinx also may carry out attacks even on accounts that have low privileges on the affected computer and even on computers with a slow Internet connection. One of the most devastating aspects of Sphinx, however, is its BackconnectVNC feature. Using this feature, Sphinx lets fraudsters carry out money transfers directly from the victim's computer. This means that a con artist is not limited to simply collecting a victim's online banking data, but can wipe the victim's accounts and credit immediately.

How to Protect Yourself from Sphinx

Ensure that your computer is protected from Sphinx properly with the help of an anti-malware program that is fully up-to-date. Fortunately, Zeus variants are well known and can be intercepted with reliable security software. It is also important to enable security measures such as a two-step authentication on your online banking account.

Related Posts

Site Disclaimer

Enigmasoftware.com is not associated, affiliated, sponsored or owned by the malware creators or distributors mentioned on this article. This article should NOT be mistaken or confused in being associated in any way with the promotion or endorsement of malware. Our intent is to provide information that will educate computer users on how to detect, and ultimately remove, malware from their computer with the help of SpyHunter and/or manual removal instructions provided on this article.

This article is provided "as is" and to be used for educational information purposes only. By following any instructions on this article, you agree to be bound by the disclaimer. We make no guarantees that this article will help you completely remove the malware threats on your computer. Spyware changes regularly; therefore, it is difficult to fully clean an infected machine through manual means.