{"id":4661,"date":"2012-12-11T22:00:00","date_gmt":"2012-12-11T22:00:00","guid":{"rendered":"https:\/\/evssolutions.com\/new-trojan-trumps-two-factor-authentication\/"},"modified":"2012-12-11T22:00:00","modified_gmt":"2012-12-11T22:00:00","slug":"new-trojan-trumps-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/evssolutions.com\/insights\/new-trojan-trumps-two-factor-authentication\/","title":{"rendered":"New Trojan Trumps Two-Factor Authentication"},"content":{"rendered":"
<\/p>\n
The newly discovered Trojan, Eurograbber, is making news for
Banks and other institutions, which do not use two-factor
[Contributed by EVS Marketing]<\/p>\n<\/p>\n <\/p>\n","protected":false},"excerpt":{"rendered":" The newly discovered Trojan, Eurograbber, is making news for more than just being a Trojan that attacks mobile channels. Cyber thieves have created this Trojan in a way that first attacks a victims PC and then moves into their mobile<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-4661","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":0,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"wp:attachment":[{"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/evssolutions.com\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nmore than just being a Trojan that attacks mobile
\nchannels<\/a>. Cyber thieves have created this Trojan in a way that first
\nattacks a victims PC and then moves into their mobile phone when the user
\nenters the one-time passcode generated for two-factor authentication. As Darrell
\nBurkey discussed in an interview, the most concerning thing about this Trojan
\nis the way it was engineered. It was created specifically to attack a certain
\ntype of authentication that many banking institutions are now using. This type
\nof mal-technology could attack any type of institution and cause a threat to standard
\nauthentication measures. Over $47 million US dollars worth of Euros have
\nalready been stolen from this lone Trojan. And just because this threat was
\ncreated in Europe, does not mean it is contained to only attacking users over
\nseas. The attacks originated in Italy and then quickly spread through out
\nneighboring countries, targeting Android and Blackberry deceives. <\/p>\n
\nauthentication, should still heed this warning. Perhaps the most frightening
\nthing about this new development is not just the attacks themselves, but the
\noverlaying concept clearly illustrating that cyber thieves are adapting. Standard
\nand traditional authentication measures will no longer be enough to protect
\nagainst identity theft. Companies must learn to fight fire with fire and adopt fraud prevention
\nmeasures<\/a> that cant be outsmarted by cyber thieves and identity thieves.
\nJust as companies have adjusted in the past, it is time that businesses rethink
\ntheir fraud prevention strategy. Fraud prevention is not a one-size-fits-all solution and requires revising and reconstruction. Companies that have not
\nrethought their fraud prevention in the last few years, even months, may need
\nto find a new identity
\nauthentication solutions<\/a> as technology advances. The key is to be three
\nsteps ahead of your competition and cyber thieves to prevent and protect
\nagainst identity theft.<\/p>\n<\/p>\n