Menu
US, UK disrupt Dridex botnet, which targeted online banking

US, UK disrupt Dridex botnet, which targeted online banking

Dridex is considered one of the most effective banking malware families

A cybercriminal network that caused at least US$10 million in losses has been disrupted by U.S. and U.K. law enforcement, with the U.S. seeking a Moldovan man's extradition, the Department of Justice said Tuesday.

Andrey Ghinkul, 30, is accused of being the administrator of the Dridex botnet, also known as Cridex and Bugat.

A nine-count indictment was unsealed on Tuesday in the U.S. District Court for the Western District of Pennsylvania, DOJ said. Ghinkul was arrested on Aug. 28 in Cyprus.

Dridex has been a real headache for a number of years. It collects online banking credentials from infected computers, which prosecutors said were then used to initiate large wire transfers.

In one example, Ghinkul and his gang allegedly transferred $2.1 million from an account of Penneco Oil Company, based in Delmont, Pennsylvania, to one in Krasnodar, Russia, on Aug. 31, 2012, according to the indictment.

Four days later, Penneco Oil was hit again, this time with $1.3 million going to an account in Minsk, Belarus. The same day, the group allegedly tried to transfer a further $76,520 from the company's accounts.

Penneco Oil's account information was believed to have been compromised after Ghinkul's group sent one of the company's employees a phishing email, prosecutors said.

Dridex is considered one of the top banking malware families. It spreads through targeted spam that contains attachments to malicious XML files, Microsoft Office documents with macros or links to malicious websites.

The malware can log keystrokes and inject fake HTML fields into Web pages that ask users for more sensitive information. It also can frequently escape detection by antivirus software.


Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Kiwi channel comes together for another round of After Hours

Kiwi channel comes together for another round of After Hours

The channel came together for another round of After Hours, with a bumper crowd of distributors, vendors and partners descending on The Jefferson in Auckland. Photos by Maria Stefina.​

Kiwi channel comes together for another round of After Hours
Consegna comes to town with AWS cloud offerings launch in Auckland

Consegna comes to town with AWS cloud offerings launch in Auckland

Emerging start-up Consegna has officially launched its cloud offerings in the New Zealand market, through a kick-off event held at Seafarers Building in Auckland.​ Founded in June 2016, the Auckland-based business is backed by AWS and supported by a global team of cloud specialists, leveraging global managed services partnerships with Rackspace locally.

Consegna comes to town with AWS cloud offerings launch in Auckland
Show Comments