The criminals behind the highly successful Dyre malware are not
taking a break. In fact, they are turning up the heat and have set their
sights on 17 Spanish banks, and several European banks’ Spain-based
subsidiaries. IBM Security X-Force researchers were able to analyze a
new Dyre Trojan configuration file that followed the release of a new
Dyre build. This is the first configuration that targets such a large
number of Spanish banks. Previous versions only included three or five
Spain-based banks on the victim roster, likely as a way to test the
waters before moving to a more aggressive phase.
The analysis reveals that Dyre’s developers have expanded the capabilities and reach of the malware by updating its webinjections to match the new banks they are targeting in Spain. On top of its Spanish targets the Dyre gang sees opportunities in other Spanish speaking countries beyond Spain, attacking in Chile, Colombia and Venezuela. This is hardly surprising given that Spanish is the second most spoken language in the world. What is the best mitigation for this critical threat? Send your thoughts to us at the Cloud and Cyber Security Center.
The analysis reveals that Dyre’s developers have expanded the capabilities and reach of the malware by updating its webinjections to match the new banks they are targeting in Spain. On top of its Spanish targets the Dyre gang sees opportunities in other Spanish speaking countries beyond Spain, attacking in Chile, Colombia and Venezuela. This is hardly surprising given that Spanish is the second most spoken language in the world. What is the best mitigation for this critical threat? Send your thoughts to us at the Cloud and Cyber Security Center.
No comments:
Post a Comment