• Categories
    Category
  • Categories
    Category
  • News
  • Tutorials
  • Forums
  • Tags
  • Users
News Comments FAQ Related Articles

Dridex rears its ugly head again.

3123

dridex

The Dridex malware is back with a bang nearly after a year and now it has set its eyes on banking sectors. This piece of code is particularly malicious and resilient. Over the period of years it surfaces again and again that terrorizes people to give up their banking information.

Dridex is actually a malware code that leverages programs with Microsoft Office to infect financial system and it operates as Botnet-as-a-service business model and uses multiple servers to target and infiltrate the targeted banks. Researchers and FBI are getting their nerves frayed due to the seizure of multiple servers used by Dridex to steal information.

" There are significant differences from this particular DRIDEX campaign as opposed to its previous waves," Trend Micro researchers wrote. " Instead of the usual fake invoice or notification baits, DRIDEX plays on people' s fears of having their accounts compromised."

The researchers at Proofpoint found out the Dridex campaign namely Dridex botnet ID 7200. Majority of the spam came with double zipped archive attachments. The activity was mainly taking place in France, U.K and Australia.

The Dridex works by email in which the subject line read: “ Payment Request” and it included a Zip attachment masquerading as invoice, but when it is clicked it leads to deliver an executable file which contained the Dridex bot. It was also buried under two Zip files.

The return of the Dridex version 4 made the researchers and law enforcement agencies to ponder about the forthcoming attacks in the coming months. As this malware is affecting bank accounts, it is rated to be critical and it may keep everyone on their guard.

Tags:
eli
Author: 

Comments ( 0 )

No comments available

Add a comment

Frequently asked questions ( 5 )

Q

What is Dridex?

A

Dridex also was known as Bugat and Cridex is a form of malware that specializes in stealing bank credentials via a system that utilizes macros from Microsoft Word.

Q

How Dridex works really?

A

Dridex works by email in which the subject line read: &ldquo Payment Request&rdquo and it included a Zip attachment masquerading as invoice, but when it is clicked it leads to deliver an executable file which contained the Dridex bot. It was also buried under two Zip files.

Q

What rating is assigned for this Dridex for its severity?

A

Dridex is rated to be critical and it may keep everyone on their guard.

Q

What researchers identified from this Dridex attack?

A

Researchers at Proofpoint found out the Dridex campaign namely Dridex botnet ID 7200. Majority of the spam came with double zipped archive attachments. The activity was mainly taking place in France, U.K and Australia

Q

What fear factor is used by Dridex to attack users?

A

Instead of the usual fake invoice or notification baits, DRIDEX plays on people' s fears of having their accounts compromised.

Related News in Dridex rears its ugly head again.

Related News in Dridex rears its ugly head again.

Chrome extension Trojan tricks victims in an endless malware loop
Chrome extension Trojan tricks victims in an endless malware loop
Apr 29, 2017
Dridex rears its ugly head again.
Dridex rears its ugly head again.
Apr 6, 2017
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Threat actors abuse Microsoft Azure cloud services to host malware and as command and control (C&C) servers.
Jun 12, 2019
WordPress and Joomla websites infected by new backdoor malware
WordPress and Joomla websites infected by new backdoor malware
May 31, 2019
Free malware-as-a-service MacSpy hits Mac OS
Free malware-as-a-service MacSpy hits Mac OS
Jun 14, 2017
A New Linux malware strain could morph into serious threat
A New Linux malware strain could morph into serious threat
Apr 26, 2017
CrySIS ransomware targeting businesses is on the rise
CrySIS ransomware targeting businesses is on the rise
May 28, 2019
Malware threats doing the rounds in flatbed scanners
Malware threats doing the rounds in flatbed scanners
Apr 1, 2017
Back To Top!
Rank
User
Points

Top Contributers

userNamenaveelansari
135850

Top Contributers

userNameayanbhatti
92510

Top Contributers

userNamehamzaahmed
32150

Top Contributers

1
userNamelinuxhelp
31040

Top Contributers

userNamemuhammadali
24500
Can you help Sebastian ?
How to change non required to required field in SuiteCRM Custom/Default Modules

How to change not required to the required field in SuiteCRM Custom/Default Modules?

Networking
  • Routing
  • trunk
  • Netmask
  • Packet Capture
  • domain
  • HTTP Proxy
Server Setup
  • NFS
  • KVM
  • Memory
  • Sendmail
  • WebDAV
  • LXC
Shell Commands
  • Cloud commander
  • Command line archive tools
  • last command
  • Shell
  • terminal
  • Throttle
Desktop Application
  • Linux app
  • Pithos
  • Retrospect
  • Scribe
  • TortoiseHg
  • 4Images
Monitoring Tool
  • Monit
  • Apache Server Monitoring
  • EtherApe 
  • Arpwatch Tool
  • Auditd
  • Barman
Web Application
  • Nutch
  • Amazon VPC
  • FarmWarDeployer
  • Rukovoditel
  • Mirror site
  • Chef
Contact Us | Terms of Use| Privacy Policy| Disclaimer
© 2025 LinuxHelp.com All rights reserved. Linux™ is the registered trademark of Linus Torvalds. This site is not affiliated with linus torvalds in any way.