A newly discovered evolution of the traditional Man-in-the-Browser (MitB) attack, called a Universal Man-in-the-Browser (uMitB) attack, collects data from every site its victims visit and separates pertinent sensitive information, including credit-card and Social-Security numbers, before sending it to the Bad Guys in real time. I am still reeling from the bipartisan idiocy of last night’s Presidential debate, so I thought I’d focus on something slightly less depressing: A major evolution of the Man-in-the-Browser attack. Trusteer, which discovered the enhanced attack, elegantly understated the problem, saying, “This development, which we are calling Universal Man-in-the-Browser (uMitB), is significant.” There are three things that unfortunately make the uMitB much more effective than its predecessor attacks: It is able to gather data from any website someone visits and not just a specific list of sites. Plain old MitBs use malware on someone’s computer to monitor a list of targeted websites and then gather information only when users visit them. The new beast collects data from all visited sites. Not only does the new UMitB attack collect information from more places, it also parses that data to automatically find credit-card and social-security numbers and other sensitive data. Bad guys used to have to wade through massive data dumps to pull out the pertinent facts, which slowed the process down and gave victims more time to discover the theft. The uMitB also sends the sensitive data to thieves as soon as it collects it, thereby making the process even more efficient. In the past, hackers received these massive unstructured logs only periodically, further increasing the amount of time it took for the data to be put to use. The folks at Trusteer, who have reportedly been tracking the new attack for several months, say it is the first time they’ve seen the real-time parsing of stolen data. uMitB’s ability to steal sensitive data without targeting a specific website and perform real-time post-processing removes much of the friction associated with traditional MitB attacks. For example, it could be used to automate card fraud by integrating with and feeding freshly-stolen information to card-selling websites. The impact of uMitBs could be significant since information stolen in real-time is typically much more valuable than “stale” information, and the attacks eliminate the complexities associated with current post-processing approaches. So far Trusteer has only encountered uMitBs that target easily-defined strings, such as those for credit-card and Social-Security numbers. Trusteer Senior Security Strategist George Tubin told ThreatPost that he thinks the malware will evolve and eventually be able to find almost any type of data–including usernames and passwords. Ruh roh. Related content opinion Why Bitcoins are Just as Viable as Any Other Currency The true value of any currency is a reflection of how much people believe it's worth, according to CIO blogger Constantine von Hoffman. But it's wise to remember just how fast beliefs can change. By Constantine von Hoffman Apr 15, 2013 4 mins Government Technology Industry opinion No Surprise: Docs Show Obama Administration Lying About Drones President Obama has repeatedly said drones would only be used against members of al Qaida and allied groups. However, leaked intelligence documents show the administration has been using them to settle political and tribal feuds for at least four yea By Constantine von Hoffman Apr 10, 2013 3 mins Regulation Government opinion How Big Data Can Quickly Become Big Garbage The bigger the data the bigger the chance of mistakes or inaccuracies. In that vein, a large database used by retailers to screen people accused of stealing from employers is identifying innocent people and could result in major lawsuits, according t By Constantine von Hoffman Apr 04, 2013 2 mins Big Data opinion Why Crazy Trumps Logic on the Internet The earth is flat. Vaccines cause autism. 9/11 was a government conspiracy. These are just a few of the many ideas that continue to find adherents online despite overwhelming proof that they're not based on fact. CIO.com blogger Constantine von By Constantine von Hoffman Apr 02, 2013 3 mins Government Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe