Kl Remote Virtual Mugging Bank Fraud Toolkit Bypasses 2 Factor Authentication And Device Identification
The added advantage for the criminals is that it effectively circumvents both two-factor authentication and device identification protections. IBM Security Trusteer who called it ‘virtual mugging’ tool, analysed it and has released a report detailing it. The report says that unlike banking Trojans, KL-Remote is less automated and requires some manual intervention from the criminal during various stages of the fraud event. KL-Remote is distributed by embedding it with other malware and comes preloaded with a list of targeted banking URLs....