C&C Flaw Offers Glimpse into Dridex Operations

  • 8 April 2016
  • 1 reply
  • 120 views

Userlevel 7
Badge +54
By Eduard Kovacs on April 08, 2016
 
Researchers have gained access to a command and control (C&C) panel of the Dridex banking malware, which has allowed them to determine how much information has been stolen by cybercriminals and how much money they might be making.

In January, experts at Buguroo, a threat intelligence startup and spinoff of Deloitte’s European Security Operations Center, came across what appeared to be a new and evolved Dridex campaign.

The threat has been using an automated transfer system (ATS) to deliver personalized webinjects and help attackers steal personal and financial information from victims. An analysis of the JavaScript code responsible for stealing banking credentials allowed researchers to determine the location of a C&C panel used by the malware’s operators.
 
Full Article

1 reply

Userlevel 7
Well, that is certainly a coup...hopefully they will use the access wisely and soon before the 'hack' is plugged by the hackers. ;)

Reply