Menu
Dridex banking malware adds a new trick

Dridex banking malware adds a new trick

Dridex is targeting at least 13 British banks

Dridex, the banking malware that won't go away, has been improved upon once again.

IBM's X-Force researchers have found that the latest version of Dridex uses a DNS (Domain Name System) trick to direct victims to fake banking websites.

The technique, known as DNS cache poisoning, involves changing DNS settings to direct someone asking for a legitimate banking website to a fake site.

DNS cache poisoning is a powerful attack. Even if a person types in the correct domain name for a bank, the fake website is still shown in the browser.

"By keeping the victim away from the bank’s site, the fraudster can deceive them into divulging critical authentication codes without the bank knowing that the customer’s session has been compromised," wrote Limor Kessem, a cybersecurity expert with IBM's Trusteer division, in a blog post on Tuesday.

It appears Dridex's operators may have adopted the technique from a different banking trojan called Dyre, Kessem wrote. Dyre used a local proxy to accomplish the redirection, however.

Dridex's operators have created clones of the websites of 13 U.K. banks, which are used in the attacks.

After landing on one of the fake sites, Dridex collects the authentication credentials and two-factor authentication codes. The details are sent to a command-and-control servers and are verified.

If more information is needed from a victim, Dridex can inject new fields into the fake website to ask for more information, Kessem wrote.

"The fraudsters initiate the illicit transaction while the victim is being delayed by the social engineering injections on the fake site," she wrote. "In cases of successful information harvesting, the money is moved from the victim’s account to a mule account."

Dridex has proven to be a resilient foe despite law enforcement action last year by the U.S. and U.K. that took down part of its network.

The U.S. Department of Justice said on Oct. 13 it was seeking the extradition of a 30-year-old Moldovan man, Andrey Ghinkul. Prosecutors allege he used Dridex malware to steal US$10 million from U.S. companies and organizations, according to an indictment.

Security experts noticed that the number of emails with attachments containing Dridex dropped earlier that month, but the activity quickly resumed again. Victims are infected if they open a manipulated Microsoft Office document.


Follow Us

Join the newsletter!

Error: Please check your email address.

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments