Site icon IT World Canada

Malware banking campaigns against Canadians are increasing: Report

Canadian businesses and residents are increasingly targets for malware campaigns, according to a new blog from security vendor ProofPoint.

The report, issued last week, said the company has seen six different banking Trojan families, including Ursnif, Dridex, Kronos, Zeus, Gootkit, and Vawtrak, all targeting customers of financial institutions in Canada and other countries since May.

The malware isn’t delivered how you might think, in email purporting to come from a bank. Instead it comes indirectly attached through messages that allegedly come from Microsoft (with the header “Attention Urgent: Critical Security Update” and the sender “Microsoft Security Team”), Canada Post (purporting to be a message about an inability to deliver an item) and UPS (purporting to be a invoice for proof of delivery).

 

These messages either ask the victim to download a contaminated Microsoft Word document or link to a site for a malware download. The malware use a variety of techniques, from simple credential theft to advanced website modifications using web injects, to operating proxies that allow the attacker to access the bank website from the victim’s computer. The variety of techniques is one of the things that makes them so dangerous and effective, says Proofpoint.


“While it is not uncommon to see email-based malware and phishing campaigns targeting Canadian residents and businesses,” says the report, “the volume and diversity of these campaigns seem to be increasing. The malicious payloads we have been observing include all types of banking Trojans, malware specifically designed to steal funds from online banking users.”

The gang behind the Dridex malware is particularly stubborn. While one of its botnets was taken down last fall and one person was arrested, campaigns using the malware are increasing. says Proofpoint.

Separately, Cisco Systems’ Talos threat intelligence service is warning enterprises of a new campaign that started June 27 for delivering Locky/Zepto ransomware through attachments. The hoped-for targets are C-suite or vice-presidents, with the emails usually asking recipients user to look at their “requested” attached document, supposedly a report, invoice or other document. Instead a malicious Javascript connects to a command and control server and downloads the ransomware.

Regular employee awareness training is important to stifling these campaigns, not only having staff be cautious about messages with attachments but also be wary of messages that ask them to disable macros.

Exit mobile version