Dridex

From Wikipedia, the free encyclopedia
Dridex
Common nameDridex


  • As Dridex
    • Trojan:Win32/Dridex (Microsoft) [1]
    • Trojan.Dridex (Malwarebytes) [2]
    • Trojan.Win64.DRIDEX.AD (Trend Micro) [3]
    • W32/Dridex.ABA!tr ()[4]
TypeTrojan
SubtypeBanking trojan
Author(s)Necurs Maksim Yakubets

Dridex also known as Bugat and Cridex is a form of malware that specializes in stealing bank credentials via a system that utilizes macros from Microsoft Word.[5]

The targets of this malware are Windows users who open an email attachment in Word or Excel, causing macros to activate and download Dridex, infecting the computer and opening the victim to banking theft.

The primary objective of this software is to steal banking information[6] from users of infected machines to immediately launch fraudulent transactions. Bank information for the software installs a keyboard listener and performs injection attacks. During 2015, theft caused by this software were estimated at £20 million in the United Kingdom and $10 million in the United States. By 2015, Dridex attacks had been detected in more than 20 countries. In early September 2016, researchers spotted initial support for targeting cryptocurrency wallets.[7]

In December 2019, US authorities filed charges against two suspects believed to have created the Dridex malware, including the group's alleged leader.[8]

Evil Corp[]

Evil Corp (a.k.a. Dridex and INDRIK SPIDER) is a Russian hacking group that has been active since 2009.[9] In 2019, the Federal Bureau of Investigation (FBI) named nine alleged members of the group, including them of extorting or stealing over $100,000,000 through hacks that affected 40 countries.[10] The United States Department of the Treasury additionally imposed sanctions against the group.[11] In November 2021, the British Broadcasting Company published an investigation which found that the two alleged leaders of the group were living openly in Russia.[10][12]

See also[]

References[]

  1. ^ "Cyberthreats, viruses, and malware - Microsoft Security Intelligence". Microsoft.
  2. ^ "Trojan.Dridex".
  3. ^ "Search - Threat Encyclopedia".
  4. ^ "Fortiguard".
  5. ^ "Someone Hijacks Botnet Network & Replaces Malware with an Antivirus". 2016-02-04. Retrieved 2017-01-11.
  6. ^ Jeremy Kirk (2016-01-19). "Dridex banking malware adds a new trick". PCWorld. Retrieved 2017-01-11.
  7. ^ Catalin Cimpanu (2016-09-07). "Dridex Banking Trojan Will Soon Target Crypto-Currency Wallets". Softpedia. Retrieved 2017-01-11.
  8. ^ Cimpanu, Catalin (December 5, 2019). "US charges two members of the Dridex malware gang". ZDNet. Retrieved December 8, 2019.
  9. ^ Mujezinovic, Damir (2021-09-10). "Evil Corp: A Deep Dive Into One of the World's Most Notorious Hacker Groups". . Archived from the original on 2021-09-10. Retrieved 2021-11-23.
  10. ^ a b Tidy, Joe (2021-11-17). "Evil Corp: 'My hunt for the world's most wanted hackers'". BBC News. Retrieved 2021-11-23.
  11. ^ "Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware". U.S. Department of the Treasury. December 5, 2019. Archived from the original on 2019-12-05. Retrieved 2021-11-23.
  12. ^ White, Debbie (November 17, 2021). "Hackers accused of stealing $100m live openly in Russia". The Times. ISSN 0140-0460. Retrieved 2021-11-23.
Retrieved from ""