Dridex malware targets 15,000 UK bank accounts daily

Trustwave warns the macro virus masquerades as Word and Excel email attachments

Malware

Malware targeting people's banking details is hitting 15,000 people's inboxes a day, security researchers warned this week.

The malicious macro virus masquerades as Microsoft Office and Excel email attachments coming from reputable retailers or banks, which contain a banking Trojan known as Dridex.

IT security firm Trustwave said in a blog post that once a user opens the document, the Dridex malware installs itself from a remote web server, and will secretly monitor keystrokes and grab screenshots of Internet Explorer, Firefox and Chrome browsers.

Dridex's XML configuration specifies which websites to capture submission forms from, meaning that victims entering credit card details on retail sites or personal details to their banking service are at risk.

Security research VP Ziv Maldor said: "You may think of document macro viruses as a thing of the past. But this year, some cybercriminal groups have revived this type of campaign in large numbers.

"The attackers lure victims to open the attachment by using brand names of reputable companies in the UK, across a variety of sectors.

"Some of the emails refer to an 'attached invoice' saying it is coming from a software company, online retailer or banking institution.

"Once the end user opens the attachment, the Dridex malware is installed giving the criminals access to their valuable information and enabling them to update the malware so that it avoids detection."

The resurgence of macro malware came with the release of Dridex in July 2014, but the scale of such attacks has increased dramatically recently.

Palo Alto Networks security researcher Ryan Olson wrote in October last year: "Its core functionality is to steal credentials of online banking websites and allow a criminal to use those credentials to initiate transfers and steal funds."

Featured Resources

The ultimate guide to business connectivity in field services

A roadmap to increased workplace efficiency

Free download

The definitive guide to migrating to the cloud

Migrate apps to the public cloud with multi-cloud infrastructure solutions

Free download

Transform your network with advanced load balancing from VMware

How to modernise load balancing to enable digital transformation

Free download

How to secure workloads in hybrid clouds

Cloud workload protection

Free download

Recommended

Malware developers create malformed code signatures to avoid detection
malware

Malware developers create malformed code signatures to avoid detection

24 Sep 2021
New malware uses search engine ads to target pirate gamers
malware

New malware uses search engine ads to target pirate gamers

21 Jul 2021
HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

17 Sep 2021
What are the pros and cons of AI?
machine learning

What are the pros and cons of AI?

8 Sep 2021
Best MDM solutions 2020
mobile device management (MDM)

Best MDM solutions 2020

17 Sep 2021