The Dridex Banking Trojan is a sophisticated banking malware that has been active since 2011. It is designed to steal sensitive information such as bank credentials and personal data from infected systems. The trojan is known for its targeted approach and constantly evolving tactics to evade detection.
The new version of the Dridex Banking Trojan has been observed using a technique called ‘Atombombing to infect systems. ‘Atombombing is a code injection technique that exploits a vulnerability in the Windows operating system to inject malicious code into legitimate processes. This allows the trojan to evade detection by security mechanisms and avoid being removed from the system.
‘Atombombing poses a significant threat because it allows malware such as the Dridex Banking Trojan to bypass traditional security measures and infiltrate systems undetected. By injecting malicious code into legitimate processes, the trojan can carry out its malicious activities without raising any red flags, making it difficult for security experts to detect and mitigate.
What are the targeted systems for the new version of Dridex?
Is there a way to detect and remove the Dridex Banking Trojan from infected systems?
What steps can individuals and organizations take to protect themselves from Dridex and other banking Trojans?
Google Dorks Database |
Exploits Vulnerability |
Exploit Shellcodes |
CVE List |
Tools/Apps |
News/Aarticles |
Phishing Database |
Deepfake Detection |
Trends/Statistics & Live Infos |
Tags:
Dridex Banking Trojans new version infects systems using AtomBombing.