Dridex banking malware adds a new trick

Dridex is targeting at least 13 British banks.

By Jeremy Kirk

Dridex, the banking malware that won’t go away, has been improved upon once again.
IBM’s X-Force researchers have found that the latest version of Dridex uses a DNS (Domain Name System) trick to direct victims to fake banking websites.
The technique, known as DNS cache poisoning, involves changing DNS settings to direct someone asking for a legitimate banking website to a fake site.
To read the entire article, please click here.
Source: http://www.csoonline.com/

Facebooktwittergoogle_plusredditlinkedinmail