Grandoreiro banking malware disrupted – Week in security with Tony Anscombe

Cyber Security

Video

The banking trojan, which targeted mostly Brazil, Mexico and Spain, blocked the victim’s screen, logged keystrokes, simulated mouse and keyboard activity and displayed fake pop-up windows

This week, law enforcement in Brazil took action to disrupt the Grandoreiro banking malware in a joint effort that was also supported by the ESET research team, who contributed technical analysis, statistics, and known C&C server domain names and IP addresses.

The operation – which was further supported by Interpol, the Spanish Police and Caixa Bank – was aimed at individuals who are thought to be high up in Grandoreiro’s pecking order. Grandoreiro targeted victims in Brazil, Mexico, Spain and most recently also Argentina, causing millions in losses to fraud since at least 2017.

For technical information about Grandoreiro, head over to our blogpost.

Connect with us on FacebookTwitterLinkedIn and Instagram.

Products You May Like

Articles You May Like

Faulty CrowdStrike Update Crashes Windows Systems, Impacting Businesses Worldwide
Cybercriminals Exploit CrowdStrike Update Mishap to Distribute Remcos RAT Malware
HotPage: Story of a signed, vulnerable, ad-injecting driver
North Korean Hackers Shift from Cyber Espionage to Ransomware Attacks
Play Ransomware Expands to Target VMWare ESXi Environments

Leave a Reply

Your email address will not be published. Required fields are marked *