Malware variant targeting banks discovered

NGUYỄN ĐĂNG |

Variants of the Grandoreiro malware are becoming one of the major threats worldwide.

At the Security Analyst Summit (SAS) 2024, Kaspersky's Global Research and Analysis Team (GReAT) revealed a remarkable discovery: A Lite version of the Grandoreiro malware is targeting around 30 banks in Mexico.

Grandoreiro is currently one of the top threats in the banking security space, having targeted more than 1,700 banks and accounting for 5% of all banking trojan attacks globally this year.

Mexico is one of the hardest hit countries, with over 51,000 attacks involving Grandoreiro variants, including the aforementioned Lite version.

According to cybersecurity experts, cybercriminals have split Grandoreiro's source code into lightweight trojan versions (malware disguised as useful software or applications) to deploy new attack campaigns.

“When you look at all the malware that has been developed recently, it is not difficult to see that the threat landscape is becoming increasingly complex. The lightweight versions could signal a trend of attacks spreading outside of Latin America,” explains Fabio Assolini, head of Kaspersky’s Global Research and Analysis Team (GReAT) for Latin America.

Different variants of Grandoreiro, including the original malware and the lite version, accounted for about 5% of global banking attacks using the trojan detected by Kaspersky in 2024. This shows that Grandoreiro variants have become one of the most powerful threats worldwide.

Since 2024, Kaspersky has also analyzed new variants of the Grandoreiro malware and discovered that criminals are applying many new attack tactics.

For example, malware will record computer mouse activity to simulate real user behavior patterns, in order to bypass security systems based on machine learning to analyze behavior.

By simulating natural movements similar to a real user swiping a computer mouse, malware can “trick” anti-phishing tools and detect unusual behavior in the system.

Additionally, Grandoreiro uses an encryption technique that cybersecurity experts have never encountered in previous malware, making it difficult to detect and analyze cyber attacks.

According to data from Kaspersky, the Grandoreiro malware has been active since 2016.

By 2024, the threat had targeted more than 1,700 financial institutions and 276 cryptocurrency wallets across 45 countries and territories.

Most recently, Asia and Africa have been added to Grandoreiro's target list; Grandoreiro has truly become a global financial threat.

NGUYỄN ĐĂNG
RELATED NEWS

Base salary in 2026 is expected to increase, many income items are adjusted

|

The base salary in 2026 is expected to increase, leading to many regimes for workers being adjusted accordingly.

Police investigate the case of a passenger car driver in Gia Lai being assaulted in the middle of the road

|

Gia Lai - Police are investigating the case of a passenger car driver being cut in front and attacked by another car driver.

Live football Cong An Ha Noi vs Ninh Binh in round 12 of V.League

|

Live match between Hanoi Police and Ninh Binh in round 12 of LPBank V.League 2025-2026, taking place at 7:15 PM today (February 1st).

Live football match Hoang Anh Gia Lai vs Da Nang in round 12 of V.League

|

Live match between Hoang Anh Gia Lai and Da Nang in round 12 of LPBank V.League 2025-2026, taking place at 5:00 PM today (February 1st).

Land project stalled for many years has a chance to recover

|

The "75% consensus" mechanism when land is recovered is considered to create a way out for land projects that have been stalled for many years.

After the expired meat in schools, parents are cautious with semi-boarding meals

|

After information about suspected use of expired meat in the processing of school meals, many parents in Ho Chi Minh City are more worried and cautious about their children's semi-boarding meals.

Teachers anxiously waiting for overtime teaching money, local authorities direct decisive handling

|

Many localities are urgently allocating budgets to completely pay overtime tuition fees for teachers.

Phát tán mã độc chiếm đoạt dữ liệu, hưởng lợi chục tỉ đồng

Việt Dũng |

Nguyễn Văn Anh cùng đồng phạm phát triển mã độc, dùng thủ đoạn vờ tuyển dụng nhân sự dụ cho nạn nhân sập bẫy, rồi chiếm đoạt dữ liệu của họ.

Lừa đảo đặt phòng, chủ homestay mất tiền cọc vì link mã độc

nhóm pv |

Lợi dụng tình trạng khan hiếm phòng nghỉ dịp lễ 2.9, các đối tượng lừa đảo đã mạo danh khách sạn, homestay trên mạng xã hội để lừa tiền đặt cọc.

Gia tăng ồ ạt các đợt tấn công bằng mã độc tống tiền

Cẩm Hà - Khánh An |

Chỉ trong ít tháng đầu năm, thống kê của Cục An toàn thông tin (Bộ Thông tin và Truyền thông) cho thấy có hơn 300.000 nguy cơ tấn công mạng nhằm vào các hệ thống thông tin trên toàn quốc. Hệ thống của Trung tâm Giám sát không gian mạng quốc gia - NCSC cũng ghi nhận hơn 13.000 sự kiện an toàn thông tin liên quan đến mã độc ransomware trên các hệ thống thông tin.