Malware variant targeting banks discovered

NGUYỄN ĐĂNG |

Variants of the Grandoreiro malware are becoming one of the major threats worldwide.

At the Security Analyst Summit (SAS) 2024, Kaspersky's Global Research and Analysis Team (GReAT) revealed a remarkable discovery: A Lite version of the Grandoreiro malware is targeting around 30 banks in Mexico.

Grandoreiro is currently one of the top threats in the banking security space, having targeted more than 1,700 banks and accounting for 5% of all banking trojan attacks globally this year.

Mexico is one of the hardest hit countries, with over 51,000 attacks involving Grandoreiro variants, including the aforementioned Lite version.

According to cybersecurity experts, cybercriminals have split Grandoreiro's source code into lightweight trojan versions (malware disguised as useful software or applications) to deploy new attack campaigns.

“When you look at all the malware that has been developed recently, it is not difficult to see that the threat landscape is becoming increasingly complex. The lightweight versions could signal a trend of attacks spreading outside of Latin America,” explains Fabio Assolini, head of Kaspersky’s Global Research and Analysis Team (GReAT) for Latin America.

Different variants of Grandoreiro, including the original malware and the lite version, accounted for about 5% of global banking attacks using the trojan detected by Kaspersky in 2024. This shows that Grandoreiro variants have become one of the most powerful threats worldwide.

Since 2024, Kaspersky has also analyzed new variants of the Grandoreiro malware and discovered that criminals are applying many new attack tactics.

For example, malware will record computer mouse activity to simulate real user behavior patterns, in order to bypass security systems based on machine learning to analyze behavior.

By simulating natural movements similar to a real user swiping a computer mouse, malware can “trick” anti-phishing tools and detect unusual behavior in the system.

Additionally, Grandoreiro uses an encryption technique that cybersecurity experts have never encountered in previous malware, making it difficult to detect and analyze cyber attacks.

According to data from Kaspersky, the Grandoreiro malware has been active since 2016.

By 2024, the threat had targeted more than 1,700 financial institutions and 276 cryptocurrency wallets across 45 countries and territories.

Most recently, Asia and Africa have been added to Grandoreiro's target list; Grandoreiro has truly become a global financial threat.

NGUYỄN ĐĂNG
RELATED NEWS

Rescuing 14 workers who have been hungry for many days at the highway construction site

|

Dak Lak - Authorities have approached the scene to rescue a group of workers trapped in flooded areas while constructing the North-South Expressway.

Floods exceed historical levels, the Central region needs friends right now

|

Let's look towards the Central region through the Golden Heart Social Charity Fund so that people are not alone in the midst of the fierce flood.

Hundreds of workers at a company in Ninh Binh stop working collectively

|

Ninh Binh - Hundreds of workers at a company in Ninh Binh have stopped working collectively to request the company to resolve the policies.

Relief truck has a series of accidents on Phan Thiet - Dau Giay Expressway

|

Dong Nai - A truck with a HCMC license plate carrying relief goods was involved in a series of accidents on the Phan Thiet - Dau Giay Expressway.

Social housing project in Dong Anh stops accepting documents, investor speaks out

|

Hanoi - Many people who came to submit applications to buy social housing at the Dong Anh project suddenly received a notice to stop distributing numbers in order.

Leaders of the Central Committee of the Vietnam Fatherland Front encourage people affected by floods

|

Faced with the heavy damage caused by floods to the people of Khanh Hoa province, Ms. Nguyen Thi Thu Ha, member of the Party Central Committee, Vice President - General Secretary of the Central Committee of the Vietnam Fatherland Front, directly visited and presented support to the people in the area.

Phát tán mã độc chiếm đoạt dữ liệu, hưởng lợi chục tỉ đồng

Việt Dũng |

Nguyễn Văn Anh cùng đồng phạm phát triển mã độc, dùng thủ đoạn vờ tuyển dụng nhân sự dụ cho nạn nhân sập bẫy, rồi chiếm đoạt dữ liệu của họ.

Lừa đảo đặt phòng, chủ homestay mất tiền cọc vì link mã độc

nhóm pv |

Lợi dụng tình trạng khan hiếm phòng nghỉ dịp lễ 2.9, các đối tượng lừa đảo đã mạo danh khách sạn, homestay trên mạng xã hội để lừa tiền đặt cọc.

Gia tăng ồ ạt các đợt tấn công bằng mã độc tống tiền

Cẩm Hà - Khánh An |

Chỉ trong ít tháng đầu năm, thống kê của Cục An toàn thông tin (Bộ Thông tin và Truyền thông) cho thấy có hơn 300.000 nguy cơ tấn công mạng nhằm vào các hệ thống thông tin trên toàn quốc. Hệ thống của Trung tâm Giám sát không gian mạng quốc gia - NCSC cũng ghi nhận hơn 13.000 sự kiện an toàn thông tin liên quan đến mã độc ransomware trên các hệ thống thông tin.