Dridex malware targets 15,000 UK bank accounts daily

Trustwave warns the macro virus masquerades as Word and Excel email attachments

Malware

Malware targeting people's banking details is hitting 15,000 people's inboxes a day, security researchers warned this week.

The malicious macro virus masquerades as Microsoft Office and Excel email attachments coming from reputable retailers or banks, which contain a banking Trojan known as Dridex.

IT security firm Trustwave said in a blog post that once a user opens the document, the Dridex malware installs itself from a remote web server, and will secretly monitor keystrokes and grab screenshots of Internet Explorer, Firefox and Chrome browsers.

Dridex's XML configuration specifies which websites to capture submission forms from, meaning that victims entering credit card details on retail sites or personal details to their banking service are at risk.

Security research VP Ziv Maldor said: "You may think of document macro viruses as a thing of the past. But this year, some cybercriminal groups have revived this type of campaign in large numbers.

"The attackers lure victims to open the attachment by using brand names of reputable companies in the UK, across a variety of sectors.

"Some of the emails refer to an 'attached invoice' saying it is coming from a software company, online retailer or banking institution.

"Once the end user opens the attachment, the Dridex malware is installed giving the criminals access to their valuable information and enabling them to update the malware so that it avoids detection."

The resurgence of macro malware came with the release of Dridex in July 2014, but the scale of such attacks has increased dramatically recently.

Palo Alto Networks security researcher Ryan Olson wrote in October last year: "Its core functionality is to steal credentials of online banking websites and allow a criminal to use those credentials to initiate transfers and steal funds."

Featured Resources

Unleashing the power of AI initiatives with the right infrastructure

What key infrastructure requirements are needed to implement AI effectively?

Download now

Achieve today. Plan tomorrow. Making the hybrid multi-cloud journey

A Veritas webinar on implementing a hybrid multi-cloud strategy

Download now

A buyer’s guide for cloud-based phone solutions

Finding the right phone system for your modern business

Download now

The workers' experience report

How technology can spark motivation, enhance productivity and strengthen security

Download now

Recommended

What is e-safety?
e safety

What is e-safety?

27 Jan 2021
Your essential guide to internet security
Security

Your essential guide to internet security

27 Jan 2021
Mimecast links breach to SolarWinds hackers
Security

Mimecast links breach to SolarWinds hackers

27 Jan 2021
TikTok vulnerability exposed private user data
data protection

TikTok vulnerability exposed private user data

26 Jan 2021

Most Popular

WhatsApp could face €50 million GDPR fine
General Data Protection Regulation (GDPR)

WhatsApp could face €50 million GDPR fine

25 Jan 2021
How to move Windows 10 from your old hard drive to SSD
operating systems

How to move Windows 10 from your old hard drive to SSD

21 Jan 2021
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

12 Jan 2021