News

Cybercriminals target US banks with Trickbot Trojan

Friday 21 July 2017 00:30 CET | News

Researchers at Flashpoint have discovered a new Trickbot spam campaign developed to hit 50 additional banks including 13 companies based in the US.

Trickbot, which specifically threatens businesses in the financial sector, has been behind man-in-the-browser (MitB) attacks since 2016. Until now, its web inject configuration was only used to hit organisations outside the US.

One of the main concerns with Trickbot is account takeover and fraud, which may increase among US financial institutions as the malware spreads. While its primary focus is financial institutions, experts anticipate other companies will eventually be at risk.

Trickbot is considered the successor to the Dyre banking Trojan, judging by the similarities between their infrastructure and setup of their configuration files. Flashpoint director of research Vitali Kremez said that it is possible the Trickbot author was either deeply familiar with Dyre or reused old source code. The threat actors behind Dyre have historically targeted Western financial institutions in the US, UK, and Canada.


Free Headlines in your E-mail

Every day we send out a free e-mail with the most important headlines of the last 24 hours.

Subscribe now

Keywords: cybercrime, Trojan, banking, US, Trickbot, Flashpoint, web fraud, man-in-the-browser
Categories: Fraud & Financial Crime
Companies:
Countries: World
This article is part of category

Fraud & Financial Crime






Industry Events