Incident Of The Week: Silence Trojan Records Financial Info

Add bookmark

In the dynamic world of cyber security, breaches are both tightly guarded and, sadly, imminent.

Combing through data, market research and threat-defense efforts taken by enterprises can be a daunting task. Here at Cyber Security Hub, we both track the latest industry news and make it more navigable for the IT professional. CSHub coverage extends outwards – as it helps enterprises batten down their proverbial hatches.

In this edition of “Incident of the Week,” we examine the Silence Trojan which appears poised to rob financial institutions in Russia, Armenia, Malaysia, and beyond.

The threat was reportedly discovered by researchers at the Kaspersky Lab in September. Kaspersky’s GReAT investigation team said that most of the offensives have been leveled at Russia.

The Trojan’s repertoire appears to mimic that of the Eastern European Carbanak group – which was deemed an advanced persistent threat (APT) that utilized spear phishing malware practices and a Trojan backdoor to lord over sensitive financial information and even gain remote access. Carbanak placed Russian institutions within its crosshairs – but reached as far as Denmark and the U.S.

See related: Incident Of The Week: Research Reports Hacked At Forrester

After a period of close monitoring, Carbanak hounds obtained sufficient information and covertly tapped into banks’ coffers. In fact, it siphoned about $1 billion over two years – at 100 different banks over a wide territory.

There is no defined connection between Silence and Carbanak, although the outward similarities are there. Nevertheless, a multi-step procedure gains Silence black hats access to information it’s deemed profitable.

First, a Silence hacker gains access to an employee’s email account. This occurs via leaked data or malware entrance. Using spear phishing techniques, the hackers look to expand their corrupted network to other computers, with the hopes of gaining access to financial management systems.

According to Bleeping Computer, the phishing emails contain a CHM (compiled HTML) file attachment that, if opened, runs JavaScript commands which pull in malware. Following this “dropper” stage, data is collected and shipped over to the hackers’ command and control (C&C) servers.

See related: NotPetya Costs Merck, FedEx, Maersk $800M

If the respective computer is recruited into the ring of infected devices, the second stage begins – and that is the Silence Trojan itself. One module sets up camp and takes repeated screenshots of the user’s activity. The next module uses Windows administration tools to record all onscreen activity. Resulting bitmaps create a “pseudo-video stream” so the controllers can pounce on accounts and management systems, at will.

Collected research on the Trojan suggests that its administrators speak Russian. The value of seized money is currently unknown, as is the relationship between Silence and Carbanak, if any.

Those tasked with enterprise security oversight sure have their hands full, but it is certainly best to know the warning signs – before their lock is picked.

 


Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended