Dridex, which previously focused on European bank accounts, has shifted to the US. The malware is typically distributed through phishing, and once machines are infected, online banking credentials are stolen with web injections and redirects to fake webpages.
Dridex uses VNC functionality to remotely connect to infected PCs to initiate fraudulent online payments and bank account transactions.
According to F5, 80% of Dridexs latest targets are located in the US. Dridex target list was significantly, mainly focusing its attacks against online US bank accounts, users of social media sites that are related to the US, credit card companies and financial investment corporations.
Every day we send out a free e-mail with the most important headlines of the last 24 hours.
Subscribe now