Browsing tag

Dridex

BitPaymer Ransomware Attack Several Spanish MSSP Based Companies Via Hacked Websites

A new wave of BitPaymer Ransomware attack several MSSP based companies in Spain through compromised websites, and it’s using various other malware interaction before infecting the company network. Before the original BitPaymer ransomware attack takes place, threat actors initially infect the victims with a different type of malware such as Azorult, Chthonic, Dridex. Last 2 years, ransomware attacks […]

NEW YEAR, NEW LOOK – DRIDEX VIA COMPROMISED FTP

Forcepoint Security Labs have recently observed a peculiar email campaign distributing a variant of the Dridex banking trojan. The campaign used compromised FTP sites instead of the more usual HTTP link as download locations for malicious documents, exposing the credentials of the compromised FTP sites in the process. The malicious emails were distributed just before 12:00 UTC […]

Banker jailed for helping criminals who stole millions using Dridex malware

Cybersecurity specialists often emphasize the dangers of insider threats and this banker has proven them correct. On Tuesday, December 12th, 2017, a 29-year-old Barclays banker Jinal Pethad was jailed for six years and four months for assisting two Moldovan cybercriminals to launder more than £2.5 million ($3 million) from Barclays Ealing, London branch where he worked. The cybercriminals identified as […]

Ransomware Attack Involving Scarab Malware Sends Over 12M Emails in 6 Hours

Security researchers at the Austin based Anti-virus software firm Forcepoint have discovered a massive spam ransomware campaign in which the Scarab malware destroys all your files if you don’t pay the ransom, which is asked in Bitcoin. The campaign was started on 23rd November while attackers have used the largest email spam botnet on the […]

Dridex Banking Trojan Returns, Leverages New UAC Bypass Method

First observed in July 2014, “Dridex,” a financial banking Trojan, is considered the successor to the “GameOver ZeuS” (GoZ) malware. • Dridex was most active between 2014 and 2015, and smaller campaigns were observed throughout 2016 with its peak activity in May 2016. • On January 25, 2017, the criminal syndicate behind Dridex launched another […]

DRIDEX Poses as Fake Certificate in Latest Spam Run

By Michael Casayuran, Rhena Inocencio, and Jay Yaneza At a glance, it seems that DRIDEX has dwindled its activities or operation, appearing only for a few days this May. This is quite unusual given that in the past five months or so, this prevalent online banking threat has always been active in the computing landscape. […]

Dridex Malware is Back and Targeting Banking Sector in US

US Financial Institutions and banks Threatened by Deadly New Version of Dridex Malware Once upon a time, there was a malware called Dridex, which was a preferred attacking tool of hackers and threat actors but then it lost its spark and we all forgot about how devastating it was. But the malware is back with […]

Mystery hacker pwns Dridex Trojan botnet… to serve antivirus installer

Part of the distribution channel of the Dridex banking Trojan botnet may have been hacked, with malicious links replaced by installers for Avira Antivirus. Avira reckons the pwnage is down to the work of an unknown white hat hacker. The Dridex botnet has remains a menace even after a high profile takedown operation in late […]

MALWARE ANALYSIS – DRIDEX & PROCESS HOLLOWING

Lately the threat actors behind Dridex malware have been very active. Across all the recent Dridex phishing campaigns the technique is the same. All the Microsoft Office documents containembedded macros that download a malicious executable from one of many hard coded URLs. These hard coded URLs normally point to websites owned by legitimate people. The site […]

Hackers being hunted after stealing $30.7M via malware

Global law enforcement agencies have arrested a gang member behind the theft of £20 million ($30.7 million) via a piece of malicious software that records banking details, and are on the hunt for the remaining members. The malware – known as Dridex – is believed to be developed by in eastern Europe and it’s able […]

AutoIt Used in Targeted Attacks to Move RATs

Hackers, months ago, revived macros as an attack vector to primarily hide banking malware spread by spam campaigns. Not be left out, some targeted attacks kicked off by convincing phishing emails, have been moving a few remote access Trojans and other malware via Word docs. One particular targeted campaign, researchers at Cisco said, was using […]

Banking Malware Delivered via Macro in PDF Embedded Word Document

Delivering banking malware through Microsoft Word documents has been a less common method. However, it is currently being used for spreading malicious macros and PDF files in a single item — Avast Experts. Researchers at Avast have identified that the previously less common method of spreading banking malware has suddenly been increased. They further noted […]