Categories: MalwareSecurity

KINS trojan is threatening banking sector

KINS trojan is the name of the new banking malware that RSA researchers discovered thanks to an announcement on the Russian black market.

Early 2013 RSA discovered traces of a news banking trojan named KINS, security experts have followed the evolution of the malware in the underground community. RSA researchers discovered an announcement on the Russian black market for the new Trojan toolkit.

The advertisement for the sale of KINS has been published on a closed Russian-speaking underground forum.

According RSA experts the KINS trojan could have an impact on banking ecosystem superior to the predecessors Spyeye and Zeus, it is the first public offers of similar malware since the Citadel malicious code was retired from cyber criminal commerce at the end of 2012.

“This is the first actual commercial Trojan we’ve seen in a while, since Citadel was taken off the market. We haven’t seen anything serious enough on the part of malware developers,” “This is the first time something might materialize into a real, commercial banking Trojan” declared Limor Kessem, cybercrime specialist at RSA.

Is KINS trojan linked to other malware such as Zeus or SpyEye?

The advertisement for KINS found by RSA experts claims that the malicious code is totally new project that is not derived from re-engineering of other malware source code.

RSA researchers are investigating on it to prove the truth of the assertion, but despite authors of KINS sustain that the trojan is not based on previous malware, RSA says the it has many similarities with predecessors, including a main file plus DLL plug-ins, the compatibility with Zeus Web injections and the Anti-Rapport plug-in that came with SpyEye.

Another interesting feature is that seems that Russian users cannot get infected by KINS exactly like happened to the Citadel.

KINS has a modular structure, basic offer includes a bootkit, a dropper, DLLS and Zeus-compatible Web injects. The authors sells the KINS trojan for $5,000 in basic configuration and propose every additional modules and plug-ins for $2,000 a piece.

The Bootkit component is considered of most interesting features, none of KINS predecessors was equipped with a  Bootkit. It is a Volume Boot Record (VBR), designed to cover presence of the Trojan  that will take hold of the infected computer from a much deeper level.

Following key features highlighted by RSA:

  • KINS trojan architecture is built like Zeus/SpyEye, with a main file and DLL-based plugins
  • KINS is compatible with Zeus web injections, the same as SpyEye
  • KINS trojan comes with the Anti-Rapport plugin which was featured in SpyEye
  • KINS will work with RDP (like SpyEye)
  • KINS trojan does not require technical savvy – much as Zeus doesn’t
  • Users in USSR countries will not be infected by KINS– a feature that was first introduced by Citadel in January 2012.
  • Keeping KINS away from Trojan trackers – a problem that plagued SpyEye
  • Spread via popular exploit packs such as Neutrino – using one of the most sophisticated packs out there
  • A Bootkit in store – the Trojan will take hold of the infected computer from a much deeper level, it’s Volume Boot Record (VBR)
  • KINS will easily infect machines running Win8 and x64 operating systems

To have an idea of the cost of a bootkit consider that the authors of Carberp Trojan proposed it on the black market for $40,000, but KINS is the first commercial Trojan that comes with a built in bootkit mode.

“This guy is planning to bring in a bootkit. That’s interesting. It’s going to be an interesting way to have the Trojan infect a computer: it’s more stealthy when it’s a bootkit,” Kessem said.

RSA revealed that the commercial Trojan market is in full riot:

“The ongoing turbulence since the leak of the Zeus code in mid-2011 has not given way to a stable offering in the underground, and it seems that professional cybercrime malware developers are just not what they used to be,”

KINS  is going to be very successful considering that law enforcement have arrested principal actors of black markets, we are in a condition where banking malware demand is high and the cybercrime underground is missing its principal players.

Pierluigi Paganini

(Security Affairs – malware, KINS trojan)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

20 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

21 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.