Close Menu
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
  • Home
  • Education
  • Finance
  • Latest Internet News
    • Social Media
    • Software
  • Game
  • Contact Us !
Facebook X (Twitter) Instagram
BlogSpotTipsBlogSpotTips
Home»Software»Dridex banking malware adds a new trick
Software

Dridex banking malware adds a new trick

DeepBy DeepFebruary 4, 2016No Comments2 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest Email

Fraud gang targeted large European companies

Dridex, the banking malware that won’t go away, has been improved upon once again.

IBM’s X-Force researchers have found that the latest version of Dridex uses a DNS (Domain Name System) trick to direct victims to fake banking websites.

The technique, known as DNS cache poisoning, involves changing DNS settings to direct someone asking for a legitimate banking website to a fake site.

DNS cache poisoning is a powerful attack. Even if a person types in the correct domain name for a bank, the fake website is still shown in the browser.

“By keeping the victim away from the bank’s site, the fraudster can deceive them into divulging critical authentication codes without the bank knowing that the customer’s session has been compromised,” wrote Limor Kessem, a cybersecurity expert with IBM’s Trusteer division, in a blog post on Tuesday.

It appears Dridex’s operators may have adopted the technique from a different banking trojan called Dyre, Kessem wrote. Dyre used a local proxy to accomplish the redirection, however.

Dridex’s operators have created clones of the websites of 13 U.K. banks, which are used in the attacks.

After landing on one of the fake sites, Dridex collects the authentication credentials and two-factor authentication codes. The details are sent to a command-and-control servers and are verified.

If more information is needed from a victim, Dridex can inject new fields into the fake website to ask for more information, Kessem wrote.

“The fraudsters initiate the illicit transaction while the victim is being delayed by the social engineering injections on the fake site,” she wrote. “In cases of successful information harvesting, the money is moved from the victim’s account to a mule account.”

Dridex has proven to be a resilient foe despite law enforcement action last year by the U.S. and U.K. that took down part of its network.

The U.S. Department of Justice said on Oct. 13 it was seeking the extradition of a 30-year-old Moldovan man, Andrey Ghinkul. Prosecutors allege he used Dridex malware to steal US$10 million from U.S. companies and organizations, according to an indictment.

Security experts noticed that the number of emails with attachments containing Dridex dropped earlier that month, but the activity quickly resumed again. Victims are infected if they open a manipulated Microsoft Office document.

[“source -pcworld”]

 

Dridex banking malware adds a new trick
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Deep

Related Posts

How to Avoid Managing Open Source Software’s

March 24, 2025

Strategies for Structuring and Scaling High-performance Data Labeling Teams

March 12, 2025

Release Your Business Potential in Patna with Custom Programming Advancement Arrangements

February 1, 2025
Recent Post
  • The Best Time to Post on Threads in 2025 — Data from 700K+ Posts
  • Using AI-powered Enterprise Interfaces to Optimize Operational Efficiency
  • How to Grow Your Brand with Micro Influencer Marketing
  • What Are the 8 Different Types of Video Game Articles?
  • Strategies for Greater Financial Flexibility: 5 Smart Ways to Repay Your Home Loan Faster
  • PS5 Pro vs the PS5 – What’s the difference, really?
  • 4 Tips to Improve Data Loss Prevention (DLP) in Healthcare
  • A+ methods: Help students get ready for state exams
Search
  • Home
  • Privacy Policy
  • Contact Us !
© 2025 BlogSpotTips. Designed by BlogSpotTips.

Type above and press Enter to search. Press Esc to cancel.