Malware variant targeting banks discovered

NGUYỄN ĐĂNG |

Variants of the Grandoreiro malware are becoming one of the major threats worldwide.

At the Security Analyst Summit (SAS) 2024, Kaspersky's Global Research and Analysis Team (GReAT) revealed a remarkable discovery: A Lite version of the Grandoreiro malware is targeting around 30 banks in Mexico.

Grandoreiro is currently one of the top threats in the banking security space, having targeted more than 1,700 banks and accounting for 5% of all banking trojan attacks globally this year.

Mexico is one of the hardest hit countries, with over 51,000 attacks involving Grandoreiro variants, including the aforementioned Lite version.

According to cybersecurity experts, cybercriminals have split Grandoreiro's source code into lightweight trojan versions (malware disguised as useful software or applications) to deploy new attack campaigns.

“When you look at all the malware that has been developed recently, it is not difficult to see that the threat landscape is becoming increasingly complex. The lightweight versions could signal a trend of attacks spreading outside of Latin America,” explains Fabio Assolini, head of Kaspersky’s Global Research and Analysis Team (GReAT) for Latin America.

Different variants of Grandoreiro, including the original malware and the lite version, accounted for about 5% of global banking attacks using the trojan detected by Kaspersky in 2024. This shows that Grandoreiro variants have become one of the most powerful threats worldwide.

Since 2024, Kaspersky has also analyzed new variants of the Grandoreiro malware and discovered that criminals are applying many new attack tactics.

For example, malware will record computer mouse activity to simulate real user behavior patterns, in order to bypass security systems based on machine learning to analyze behavior.

By simulating natural movements similar to a real user swiping a computer mouse, malware can “trick” anti-phishing tools and detect unusual behavior in the system.

Additionally, Grandoreiro uses an encryption technique that cybersecurity experts have never encountered in previous malware, making it difficult to detect and analyze cyber attacks.

According to data from Kaspersky, the Grandoreiro malware has been active since 2016.

By 2024, the threat had targeted more than 1,700 financial institutions and 276 cryptocurrency wallets across 45 countries and territories.

Most recently, Asia and Africa have been added to Grandoreiro's target list; Grandoreiro has truly become a global financial threat.

NGUYỄN ĐĂNG
RELATED NEWS

Continuous patrol, police handle a series of wrongly parked cars on the central street of Hanoi

|

Hanoi - Police strengthen patrols on Tang Bat Ho street (Hai Ba Trung ward), detecting and handling many cars parked incorrectly, occupying bus stops...

37 cosmetics were recalled and forced to be destroyed, including many familiar products

|

The Drug Administration of Vietnam (Ministry of Health) fined BB Vietnam Company 75 million VND, forcing the recall and destruction of 37 violating cosmetic products.

A series of public houses and land in prime locations of Da Nang are deserted

|

Da Nang - Although located on bustling streets, a series of public houses and land in Da Nang are still in a state of being vacant and degraded.

Hanoi Chairman: Do not allow the situation where citizens have to travel back and forth many times, sending petitions beyond their authority

|

Hanoi - Chairman of the City People's Committee Vu Dai Thang requested not to let the situation of citizens having to travel back and forth many times and submit petitions beyond their authority.

Iranian ship passes through Hormuz then loses track, about 800 ships are trapped

|

An Iranian ship, among the 3 ships - including 2 cargo ships and 1 fuel ship - passed through the Strait of Hormuz on the morning of April 21.

South Korean President Lee Jae Myung and his wife pay state visit to Vietnam

|

South Korean President Lee Jae Myung and his wife arrived in Hanoi, beginning a state visit to Vietnam.

Phát tán mã độc chiếm đoạt dữ liệu, hưởng lợi chục tỉ đồng

Việt Dũng |

Nguyễn Văn Anh cùng đồng phạm phát triển mã độc, dùng thủ đoạn vờ tuyển dụng nhân sự dụ cho nạn nhân sập bẫy, rồi chiếm đoạt dữ liệu của họ.

Lừa đảo đặt phòng, chủ homestay mất tiền cọc vì link mã độc

nhóm pv |

Lợi dụng tình trạng khan hiếm phòng nghỉ dịp lễ 2.9, các đối tượng lừa đảo đã mạo danh khách sạn, homestay trên mạng xã hội để lừa tiền đặt cọc.

Gia tăng ồ ạt các đợt tấn công bằng mã độc tống tiền

Cẩm Hà - Khánh An |

Chỉ trong ít tháng đầu năm, thống kê của Cục An toàn thông tin (Bộ Thông tin và Truyền thông) cho thấy có hơn 300.000 nguy cơ tấn công mạng nhằm vào các hệ thống thông tin trên toàn quốc. Hệ thống của Trung tâm Giám sát không gian mạng quốc gia - NCSC cũng ghi nhận hơn 13.000 sự kiện an toàn thông tin liên quan đến mã độc ransomware trên các hệ thống thông tin.