By Eduard Kovacs on April 08, 2016
Researchers have gained access to a command and control (C&C) panel of the Dridex banking malware, which has allowed them to determine how much information has been stolen by cybercriminals and how much money they might be making.
In January, experts at Buguroo, a threat intelligence startup and spinoff of Deloitte’s European Security Operations Center, came across what appeared to be a new and evolved Dridex campaign.
The threat has been using an automated transfer system (ATS) to deliver personalized webinjects and help attackers steal personal and financial information from victims. An analysis of the JavaScript code responsible for stealing banking credentials allowed researchers to determine the location of a C&C panel used by the malware’s operators.
Full Article
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.