The DYREZA banking trojan is being used in a campaign which has been initiated by cybercriminals.
The cybercriminals behind the DYREZA banking trojan are using crafted malicious ‘Flash Player Update’ schemes to install the DYREZA banking trojan on the devices of the following listed banks:
- Bank of America
The CSIS team has researched the DYREZA banking trojan, and they explain that the code is designed to work just like the ZeuS banking trojan. DYREZA is able to perform ‘hooking’ on Internet Explorer, Google Chrome, and Firefox. They explain that the malware is able to harvest data at any selected and connected state.
The malware is being provided to the unaware users via the following known campaigns
- Your FED TAX payment ID [random number]
- RE: Invoice #[Random number]
The campaigns are using the following text to infect the unaware users:
Please review attached documents regarding your account
To view/download your documents please click here
Tel: 01322 247616
Fax: 01322 202705
email: [email protected]
This information is classified as Confidential unless otherwise stated.
The malware contains the following target information:
Our friends at RedSocks provided information regarding the DYREZA banking trojan. The information which is provided, gives insight in the network events which are started by the DYREZA banking trojan.
DYREZA Network Events
- DNS query: granatebit.com
- DNS query: newsbrontima.com
- DNS query: teromasla.com
- DNS query: yaroshwelcome.com
- Sends data to: 10.74.11.255:137
- Sends data to: 220.127.116.11:53
- Sends data to: 10.74.2.255:137
The malware samples have been uploaded to the malwr.com website, which provides insight in the various values of the DYREZA trojan.
Stay safe on the internet
Take a look at the security tips which will help you to stay safe. The following collection of security questions can be used to discuss the security status of your company. Be aware of the various schemes which are luring unaware social media users. Use this checklist to control the security status of your social media account.