Jump to content

Dridex

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by FockeWulf FW 190 (talk | contribs) at 23:16, 24 June 2017 (Removing link(s) to "Banking trojan": removed link to non-existent article. (TW)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Dridex
TypeTrojan
SubtypeBanking trojan
AuthorsNecurs

Dridex also known as Bugat and Cridex is a form of malware that specializes in stealing bank credentials via a system that utilizes macros from Microsoft Word.[1]

The targets of this malware are Windows users who open an email attachment in Word or Excel, causing macros to activate and download Dridex, infecting the computer and opening the victim to banking theft.

The primary objective of this software is to steal banking information[2] from users of infected machines to immediately launch fraudulent transactions. Bank information for the software installs a keyboard listener and performs injection attacks. During 2015, theft caused by this software were estimated at £20 million in the United Kingdom and $10 million in the United States. By 2015, Dridex attacks had been detected in more than 20 countries. In early September 2016, researchers spotted initial support for targeting crypto-currency wallets.[3]

See also

References

  1. ^ Mohit Kumar (2016-02-04). "Someone Hijacks Botnet Network & Replaces Malware with an Antivirus". Retrieved 2017-01-11.
  2. ^ Jeremy Kirk (2016-01-19). "Dridex banking malware adds a new trick". PCWorld. Retrieved 2017-01-11.
  3. ^ Catalin Cimpanu (2016-09-07). "Dridex Banking Trojan Will Soon Target Crypto-Currency Wallets". Softpedia. Retrieved 2017-01-11.