Good news ! Hackbusters community is waiting for you !  https://discuss.hackbusters.com
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at: https://discuss.hackbusters.com.

Attackers Spread Dridex Banking Trojan Via Malicious Macros

Researchers at Trustwave have identified an attack campaign using macros that is targeting banking customers in the U.K. – yet another example of attackers leveraging the technique.

The attack works this way – the victim gets an email with a Microsoft Word or Excel document attached. The document includes a payload that downloads malware called 'Dridex', which is designed to target online banking information. The attacks lure the victims to open the attachment by using the names of legitimate companies located in the U.K. Some of the emails refer to an 'attached invoice' by stating it comes from a software company, online retailer or bank.

Once the user opens the attachment,Dridex malware is installed. Users must enable macros in order for the malicious documents to work, andthe some of the documents contain instructions on how to do just that.

"The cybercriminal group behind this attack has used every single type of spam attack and malware propagation vector; from simple...(continued)

View All Trending Stories