A virus steals banking data - Geeko

The health crisis we are going through is blessed bread for hackers who do not hesitate to take advantage of the coronavirus epidemic to make victims. In addition to increasing their attacks thanks to the boom in telework, they are adapting their themes to surf on the subjects of concern to the population. This is how the Dridex Trojan gets talked about again.

Appeared in 2011, this malicious software which targets the bank data of its victims reappeared during the month of March. It has also risen to the top position of the main malware, reports Check Point, a company specializing in cybersecurity.

The virus particularly targets "the Windows platform, broadcasting spam campaigns to infected computers and stealing bank identifiers and other personal data in order to potentially provide access to other financial information," said Check Point in its report.

Phishing, a gateway

The return of the Trojan horse - which has seen numerous updates over the years - has been helped by the proliferation of spam campaigns, spam, including a malicious attachment containing the famous Dridex.

Once installed on a machine, the Trojan "establishes contact with a remote server, sends information about the infected system and can also download and run additional modules to enable remote control" .

“This type of malware can be very lucrative for criminals because of its sophisticated nature. Users should therefore be wary of emails with attached files, even when they appear to be from a trusted source - especially given the boom in telework in recent weeks. Businesses need to educate their employees on how to identify malicious spam. They must also deploy means to protect their teams and their networks against these types of threats, ”explains Maya Horowitz, director of Threat Intelligence & Research at Check Point.

Once again, this shows how important it is to pay attention to the emails you receive, not to panic by downloading an "urgent" attachment. If you receive an alarming email (unpaid invoice, fine, etc.) that prompts you to download a document as an attachment, take a moment to check the sender's email address and the spelling errors in the text. These are key indicators.

Finally, it is preferable to make a phone call to the organization which asks you to pay this or that invoice in order to verify the authenticity of the request. You can also connect to the site, by going to it manually and not by clicking on the links provided in the email. You will then know if it is a real payment request email.

High-Tech

Android: Over a billion smartphones vulnerable to hacker attacks

High-Tech

Cyber ​​attack: Microsoft points to rising phishing campaigns

  • Personal data
  • Computer virus
  • Coronavirus
  • Cybersecurity
  • Cyber ​​attack
  • Phishing
  • High-Tech
  • Hacker
  • Pirate