Casa > cibernético Notícias > New Dyre Banking Trojan Exploiting Adobe Reader Vulnerability

Vulnerabilidade New Dyre Banking Trojan explorando Adobe Reader

Novo trojan animais bankingO Readiness Team US Computer Emergency (CERT) emitiu um alerta na segunda-feira sobre uma campanha de e-mail malicioso entregar o Dyre Trojan bancário, aka Dyreza. As mensagens maliciosas foram detectados no meio do mês, and there is no particular demographic targeted by the cybercriminals.

The New Dyre Attack Exploits Vulnerability in Adobe Reader

Several variants of the attack have been distinguished so far. They vary in the theme of the email, the sender address and the used exploits. Ainda, they all have the same goal – to lure the user into opening the corrupted attached file that claims to be an invoice in the form of a PDF file. The malicious attachment, Invoice621785.pdf, contains exploits for vulnerabilities in Adobe Reader. This makes computer users with older and unpatched versions of the reader the perfect target.

CVE-2013-2729 is one of the vulnerabilities that allows execution of arbitrary code in Adobe Acrobat and Reader versions earlier than 9.5.5, 10.1.7, 11.0.03.

The first time the Dyre banking Trojan was spotted was in January this year and has been associated with numerous malicious campaigns since. One of the popular ones is the attack against Salesforce clients in September.

Dyre Testing Period in the Summer

The main purpose of the Dyre Trojan is to collect banking log-in details and send them to the operator. Alegadamente, it was adapted to steal also other types of credentials lately. The Dyre banking In a recent attack the Trojan has included Bitcoin websites on his target-list in the configuration file.

Campaigns, delivering the Dyre Trojan have been active all summer. The piece was included in phishing emails, claiming to be sent by JP Morgan financial institution. Another phishing email purported to be a notification for a voice message.

Experts reveal that the Trojan has been improved recently and is currently using its own SSL certificate that provides it with secure communication with the C&C server and hide malicious traffic.

Users are advised to be extra careful when they receive unsolicited emails and be attentive to spelling and grammar mistakes in the messages. Specialists point out that the presence of Google Update Service might be an indication of infection.


Berta Bilbao

Berta é um pesquisador de malware dedicado, sonhando para um espaço cibernético mais seguro. Seu fascínio com a segurança de TI começou há alguns anos atrás, quando um malware bloqueado la fora de seu próprio computador.

mais Posts

Deixe um comentário

seu endereço de e-mail não será publicado. Campos obrigatórios são marcados *

Compartilhar no Facebook Compartilhar
Compartilhar no Twitter chilrear
Compartilhar no Google Plus Compartilhar
Partilhar no Linkedin Compartilhar
Compartilhar no Digg Compartilhar
Compartilhar no Reddit Compartilhar
Partilhar no StumbleUpon Compartilhar