Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 22 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Dridex Trojan targets UK users and businesses

by The Gurus
February 12, 2015
in Editor's News
Share on FacebookShare on Twitter

The Dridex banking Trojan is being heavily targeting the UK.
Following the publication of a heatmap which showed the interest in the UK, Peter Kruse, head of Danish security firm CSIS, said that the heavy targeting of the malware against UK businesses and users is unusual, but it is obvious that those behind this malware family have a special interest in consumers as well as companies located in the UK.
He said: “The primary purpose of Dridex is to harvest sensitive data and manipulate forms and content belonging to online banking. This way it lures the user to enter additional login information in order to circumvent certain security mechanisms. Dridex is especially interested in fat bank accounts.”
According to research by Proofpoint, Dridex is a well-known strain of malware that leverages macros in Microsoft Office to infect systems and often operates by arriving in spam emails, posing as a Word document. If the user opens the document, a macro embedded in the document surreptitiously triggers a download of the Dridex banking malware, enabling it to first steal banking credentials and then attempt to generate fraudulent financial transactions.
Kruse said that Dridex is still being maintained and developed and even though it is rather well documented by malware researchers and anti-virus companies, it’s still very tough to provide static detection for this type of threat and even block the way it communicate with its command and control servers.
Kevin Epstein, VP of advanced security and governance at Proofpoint, told IT Security Guru that it has seen waves of malicious attacks and phishing campaigns targeting various geographic areas, including the UK, it confirmed the recent high Dridex activity
He said: “While it’s unclear if the current Dridex wave is actually higher in the UK or if the apparent geographic centrality is an artifact of the sinkhole locations used, Proofpoint can confirm the activity of Dridex and Dyre.
“The motives are the same: financial in nature, organised crime goes where the money is, and the UK has historically lagged the US in adoption of modern targeted attack protection technologies, instead relying on renewal of years-old anti-spam gateway contracts.
“The result is clear, phishing penetrates legacy systems, so attackers are more successful. Since Dyre is polymorphic, and delivered via longline phishing attacks, it’s like the flu; a vaccine against one variant won’t stop others. Legacy signature-based email anti-spam systems won’t help. Organisations must proactively invest in modern targeted attack protection and threat response systems.”

FacebookTweetLinkedIn
Tags: attackMalwareUK
ShareTweetShare
Previous Post

Voltage Security to be acquired by HP

Next Post

Anthem: company says five employee's credentials phished and used

Recent News

security

What Is Observability, And Why Is It Crucial To Your Business?

March 21, 2023
Organisational Cybersecurity.jpg

How Emerging Trends in Virtual Reality Impact Cybersecurity

March 21, 2023
Nominations are Open for 2023’s European Cybersecurity Blogger Awards

Nominations are Open for 2023’s European Cybersecurity Blogger Awards

March 20, 2023
TikTok to be banned from UK Government Phones

TikTok to be banned from UK Government Phones

March 17, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information