Attackers are targeting organizations in Spain and Mexico with new Grandoreiro banking trojan. The attackers target the automotive, civil and industrial construction, logistics and machinery sectors via several infection chains in Mexico and chemicals manufacturing industries in Spain.
The attackers target these organizations via spear-phishing emails written in Spanish in order to induce the victims to click on a malicious link. The link retrieves a ZIP archive from which a loader is extracted. To run the trojan, the loader is used, which pretends to be a PDF file.
“This [loader] is responsible for downloading, extracting and executing the final 400MB ‘Grandoreiro’ payload from a Remote HFS server which further communicates with the [command-and-control] Server using traffic identical to LatentBot,” said Zscaler researcher Niraj Shivtarkar.
In addition to running the trojan, the loader also collects information, retrieves a list of installed antivirus solutions, cryptocurrency wallets, banking and email apps, and exfiltrates the information to a remote server.
Findings from security researchers suggest that Grandoreiro is rapidly evolving into sophisticated malware with novel anti-analysis properties that offers attackers full remote access and poses significant threats to employees and their organizations.