Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

C&C Flaw Offers Glimpse into Dridex Operations

Researchers have gained access to a command and control (C&C) panel of the Dridex banking malware, which has allowed them to determine how much information has been stolen by cybercriminals and how much money they might be making.

Researchers have gained access to a command and control (C&C) panel of the Dridex banking malware, which has allowed them to determine how much information has been stolen by cybercriminals and how much money they might be making.

In January, experts at Buguroo, a threat intelligence startup and spinoff of Deloitte’s European Security Operations Center, came across what appeared to be a new and evolved Dridex campaign.

The threat has been using an automated transfer system (ATS) to deliver personalized webinjects and help attackers steal personal and financial information from victims. An analysis of the JavaScript code responsible for stealing banking credentials allowed researchers to determine the location of a C&C panel used by the malware’s operators.

A closer look at the panel revealed a vulnerability that allowed Buguroo to recover most of the data stolen in a Dridex campaign. The stolen records included account numbers, names, last login dates, card numbers, card types, and information on the issuing bank and country of origin.

Researchers recovered roughly 16.000 unique credit card records stolen from victims in more than 100 countries. While most of the data comes from European and English-speaking countries, the list of impacted regions also includes the Middle East, Africa and Latin America.

“Despite 70 percent of the stolen credit cards recovered being associated with English-speaking issuing organizations, around 85 percent of entities affected are located in non-English-speaking countries,” Buguroo said in its report.

Based on the number of compromised credit cards found in the C&C panel, Buguroo has calculated that attackers might have stolen as much as $800,000, even if they only obtained $500 from 10 percent of the 16,000 cards.

The vulnerable panel had been part of the 220 subnet, which was briefly disrupted last year when the Dridex botnet was targeted by law enforcement and security firms in Europe and the U.S.

Advertisement. Scroll to continue reading.

A report published earlier this year by Symantec revealed that the 220 subnet was the most prolific, accounting for 40 percent of all 145 different Dridex spam campaigns seen by the security firm over a 10-week period. Buguroo estimates that cybercrooks could have made up to $20 million in that 10-week period assuming that they launched multiple campaigns.

In addition to distributing banking malware, Dridex operators have recently started using the botnet to deliver the Locky ransomware. Last month, Trustwave reported observing over 4 million spam emails sent out over a one-week period in an effort to distribute Locky.

Related: Macro Malware Dridex, Locky Using Forms to Hide Code

Related: Dridex Trojan Borrows Redirection Attack Scheme from Dyre Malware

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.