The banking trojan “Grandoreiro” is spreading widely through a phishing campaign in over 60 countries, aiming at customer accounts of about 1,500 banks.
In January 2024, a joint international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank revealed the disruption of a malware operation. The malware had been targeting Spanish-speaking countries since 2017, resulting in $120 million in losses.
CISA has issued an urgent alert about critical vulnerabilities being exploited in Synacor’s Zimbra Collaboration and Ivanti’s Endpoint Manager (EPM)....
In September, cybersecurity experts discovered 31 new ransomware variants that threaten individuals and businesses. These programs encrypt valuable data, making...
New guidance on ransomware, released during this week's International Counter Ransomware Initiative (CRI) meeting, encourages victims to report attacks to...
IBM’s X-Force team says that Grandoreiro has been operating on a large scale since March 2024, and is now targeting English-speaking countries. It is believed that it is being rented to cybercriminals through a Malware-as-a-Service (MaaS) model.
The trojan has been updated with new powerful features and improvements, suggesting that its creators were not stopped by previous efforts to catch them.
New campaigns:
Since multiple threat actors rent the malware, the phishing lures are diverse and crafted specifically for the organizations a particular cybercriminal is targeting.
IBM has detected phishing emails pretending to be government agencies in Mexico, Argentina, and South Africa. The targeted organizations include tax administration agencies, revenue services, and federal electricity commissions.
The emails are written in the recipient’s language, include official logos and formats, and ask them to click on links to see invoices, account statements, or tax documents.
When users click on those emails, they are redirected to an image of a PDF that triggers the download of a large (100 MB) executable file called Grandoreiro loader. Click here to read full report.