What is Tinba? Tinba got its name from its extraordinarily small size – its code is approximately 20 kilobytes in size, a remarkably small number for banking malware. Tinba is a combination of the words tiny and banker; the same malware is also known as Tinybanker and Zusy. Tinba is delivered onto user systems via the Blackhole exploit kit, and is aimed primarily at users in Turkey. We estimate that there are more than 60,000 users affected by Tinba in Turkey. The capabilities of this malware are broadly similar to other similarly sophisticated info-stealing malware families. Using web injects, it steals the login information from websites, particularly those located in Turkey. Some targets such as Facebook, GMX, Google, and Microsoft are hardcoded into the code of Tinba itself and are universally targeted by Tinba. Other institutions are targeted based on downloaded configuration files; frequent targets include key government portals and Turkish banks/financial institutions. Tinba’s Infrastructure The researchers looked into the command-and-control infrastructure of the Tinba samples to gather more information about this particular attack. By examining information from WHOIS and DNS records, as well as site hosting information, they found that: Tinba is linked to other activities such as money mules, shady Web hosting, pornographic sites, and other information-stealing malware. Tinba’s infrastructure is located in Russia and Lithuania; The scale of the connections suggests that this was not the work of one or two individuals, but instead a large, well-organized gang. It's written in ASM, and it is a RadAsm 2.x project. Install MASM32 SDK : Please login or register to view links Then use the RadASM IDE(Integrated development environment) compile & make build it... IDE : Please login or register to view links Please login or register to view links Антинуб: **Скрытый текст: Для просмотра скрытого текста Вы должны авторизоваться.** Пожалуйста Зарегистрируйтесь или Войдите для того чтоб увидеть текст сообщения!