The Eurograbber campaign, as it has been named, used custom versions of Zeus and Zeus in the mobile (ZitMo) Trojans to bypass the two-factor authentication measures to compromise customer bank accounts, Check Point's Darrell Burkey told SecurityWeek. The attack intercepted SMS messages sent to customers to confirm financial transactions.
What made Eurograbber different from past Zeus campaigns, other than the sheer amount of money stolen, was the fact that it successfully compromised both the user's computer and mobile device to bypass the bank's two-factor authentication mechanisms. Law enforcement shut down the command-and-control servers in mid-October.
Link to Original Source