The banking trojan “Grandoreiro” is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of about 1,500 banks.
In January 2024, a joint international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank revealed the disruption of a malware operation. The malware had been targeting Spanish-speaking countries since 2017, resulting in $120 million in losses.
CISA has released eight advisories on vulnerabilities in Industrial Control Systems (ICS). These vulnerabilities affect essential software and hardware in...
Sophos has fixed three separate security vulnerabilities in Sophos Firewall. The vulnerabilities CVE-2024-12727, CVE-2024-12728, and CVE-2024-12729 present major risks, such...
Kaspersky's Global Emergency Response Team (GERT) found that attackers are exploiting a patched SQL injection vulnerability (CVE-2023-48788) in Fortinet FortiClient...
IBM’s X-Force team says that Grandoreiro has been operating on a large scale since March 2024, and is now targeting English-speaking countries. It is believed that it is being rented to cybercriminals through a Malware-as-a-Service (MaaS) model.
The trojan has been updated with new powerful features and improvements, suggesting that its creators were not stopped by previous efforts to catch them.
New campaigns:
Since multiple threat actors rent the malware, the phishing lures are diverse and crafted specifically for the organizations a particular cybercriminal is targeting.
IBM has detected phishing emails pretending to be government agencies in Mexico, Argentina, and South Africa. The targeted organizations include tax administration agencies, revenue services, and federal electricity commissions.
The emails are written in the recipient’s language, include official logos and formats, and ask them to click on links to see invoices, account statements, or tax documents.
When users click on those emails, they are redirected to an image of a PDF that triggers the download of a large (100 MB) executable file called Grandoreiro loader. Click here to read full report.