Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

12/9/2019
12:05 PM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

CISA Alerts the Financial Sector About Dridex

One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alert.

One of the most prevalent threats to the financial sector, the Dridex Trojan, was the subject of a recent alertfrom the DHS's Cybersecurity and Infrastructure Security Agency (CISA) along with the Department of the Treasury Financial Sector Cyber Information Group (CIG) and the Department of the Treasury's Financial Crimes Enforcement Network (FinCEN).

The alert comes after the United States Department of Justice indicted Russian nationals Maksim V. Yakubets and Igor Turashev for operating Dridex and other malware on a global scale.

Dridex has been seen operating since 2012 with many changes occurring to the Trojan and how it is used over the years. However, the route of infection usually starts with phishing emails or other methods that attempt to get the user to open a link that will lead to the Trojan's installation.

CISA says that the alert is needed since "actors using Dridex malware and its derivatives continue to target the financial services sector, including financial institutions and customers, the techniques, tactics, and procedures contained in this report warrant renewed attention. […] We expect actors using Dridex malware and its derivatives to continue targeting the financial services sector, including both financial institutions and customers."

Dridex malware operates from multiple modules that may be downloaded together or following the initial download of a "loader" module. Modules include provisions for capturing screenshots, acting as a virtual machine, or incorporating the victim machine into a botnet.

It can execute in a number of ways, including the modification of directory files, using system recovery to escalate privileges, and modification of firewall rules to facilitate peer-to-peer communication for extraction of data. Recent versions of Dridex exploit vulnerability CVE-2017-0199, which allows remote execution of code. (This vulnerability is specific to Microsoft Office and WordPad. Microsoft released a patch in 2017.)\r\n\r\nThe threat of the malware relating to financial activity is the Dridex's ability to infiltrate browsers, detect access to online banking applications and websites, and inject malware or keylogging software, via API hooking, to steal customer login information. Dridex modules can package, encrypt and transmit captured information, screenshots, etc., via peer-to-peer (P2P) networks in the XML format or in binary format, as seen in newer versions.

Attackers can also use the same botnets in their campaigns to deliver both the Dridex Trojan and Locky ransomware. This can occur simultaneously. Locky ransomware and its variants have a wide footprint, and can be very destructive.

The Dridex operators appear to direct the majority of attacks at English-speaking countries.

The alert recommends some mitigation efforts that can be performed:

  • Ensuring systems are set by default to prevent execution of macros.
  • Inform and educate employees on the appearance of phishing messages, especially those used by the hackers for distribution of malware in the past.
  • Update intrusion detection and prevention systems frequently to ensure the latest variants of malware and downloaders are included.
  • Conduct regular backup of data, ensuring backups are protected from potential ransomware attack.

The alert also provides specific Indicators of Compromise that may be included in the mitigation efforts.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
CVE-2020-12525
PUBLISHED: 2021-01-22
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CVE-2020-12511
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.