Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

12/9/2019
12:05 PM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

CISA Alerts the Financial Sector About Dridex

One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.

One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alertfrom the DHS's Cybersecurity and Infrastructure Security Agency (CISA) along with the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury's Financial Crimes Enforcement Network (FinCEN).

The alert comes after the United States Department of Justice indicted Russian nationals Maksim V. Yakubets and Igor Turashev for operating Dridex and other malware on a global scale.

Dridex has been seen operating since 2012 with many changes occurring to the Trojan and how it is used over the years. However, the route of infection usually starts with phishing emails or other methods that attempt to get the user to open a link that will lead to the Trojan's installation.

CISA says that the alert is needed since "actors using Dridex malware and its derivatives continue to target the financial services sector, including financial institutions and customers, the techniques, tactics, and procedures contained in this report warrant renewed attention. […] We expect actors using Dridex malware and its derivatives to continue targeting the financial services sector, including both financial institutions and customers."

Dridex malware operates from multiple modules that may be downloaded together or following the initial download of a "loader" module. Modules include provisions for capturing screenshots, acting as a virtual machine, or incorporating the victim machine into a botnet.

It can execute in a number of ways, including the modification of directory files, using system recovery to escalate privileges, and modification of firewall rules to facilitate peer-to-peer communication for extraction of data. Recent versions of Dridex exploit vulnerability CVE-2017-0199, which allows remote execution of code. (This vulnerability is specific to Microsoft Office and WordPad. Microsoft released a patch in 2017.)\r\n\r\nThe threat of the malware relating to financial activity is the Dridex's ability to infiltrate browsers, detect access to online banking applications and websites, and inject malware or keylogging software, via API hooking, to steal customer login information. Dridex modules can package, encrypt and transmit captured information, screenshots, etc., via peer-to-peer (P2P) networks in the XML format or in binary format, as seen in newer versions.

Attackers can also use the same botnets in their campaigns to deliver both the Dridex Trojan and Locky ransomware. This can occur simultaneously. Locky ransomware and its variants have a wide footprint, and can be very destructive.

The Dridex operators appear to direct the majority of attacks at English-speaking countries.

The alert recommends some mitigation efforts that can be performed:

  • Ensuring systems are set by default to prevent execution of macros.
  • Inform and educate employees on the appearance of phishing messages, especially those used by the hackers for distribution of malware in the past.
  • Update intrusion detection and prevention systems frequently to ensure the latest variants of malware and downloaders are included.
  • Conduct regular backup of data, ensuring backups are protected from potential ransomware attack.

The alert also provides specific Indicators of Compromise that may be included in the mitigation efforts.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Enterprise Cybersecurity Plans in a Post-Pandemic World
Download the Enterprise Cybersecurity Plans in a Post-Pandemic World report to understand how security leaders are maintaining pace with pandemic-related challenges, and where there is room for improvement.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-37146
PUBLISHED: 2021-09-28
An infinite loop in Open Robotics ros_comm XMLRPC server in ROS Melodic through 1.4.11 and ROS Noetic through1.15.11 allows remote attackers to cause a Denial of Service in ros_comm via a crafted XMLRPC call.
CVE-2021-41534
PUBLISHED: 2021-09-28
A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application is vulnerable to an out of bounds read past the end of an allocated buffer when parsing JT files. An attacker could leverage this vulnerability to leak information in the context of the c...
CVE-2021-41535
PUBLISHED: 2021-09-28
A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13771).
CVE-2021-41536
PUBLISHED: 2021-09-28
A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13778).
CVE-2021-41537
PUBLISHED: 2021-09-28
A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13789).