Banking Trojan DanaBot Now Uses Signed Email Spam as Propagation Method
#1
Quote:The modular Danabot banking Trojan has been again upgraded with email harvesting and sending capabilities after previously receiving 64-bit and RDP support following its target switch on to European targets during September 2018.

As reported by ESET's security research team, the new spam-capable Danabot version can propagate itself via spam emails sent as replies to messages found in mailboxes located on compromised machines running webmail services based on Horde, Roundcube, and Open-Xchange.

Given its modular structure and the eagerness of its authors to regularly add new plugins, ESET considers that Danabot has already surpassed the initial scope its masters had in mind when coding it.

ESET's analysis also uncovered the fact that Danabot shares script structure with other malware strains such as BackSwap, Tinba or Zeus, a clear proof of its modularity which allows it to reuse scripts from other malware families quite effortlessly.

Additionally, Danabot has been observed while exhibiting dropper behavior, peddling other malware, with a GootKit downloader module being the prime example, hinting at a direct connection between the groups controlling the two malware families.

Source: https://news.softpedia.com/news/banking-...4150.shtml
[-] The following 2 users say Thank You to silversurfer for this post:
  • Der.Reisende, harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
AdGuard for Android 4.12.2
AdGuard for Androi...harlan4096 — 09:01
Brave Browser is testing agentic AI brow...
Brave Browser is t...harlan4096 — 08:27
Ventoy 1.1.09
Ventoy 1.1.09 ...harlan4096 — 08:25
What happens to data stolen using phishi...
We follow the trai...harlan4096 — 08:23
K-Lite Codec Pack 19.3.5 / 19.3.6 Update
Changes in 19.3.6:...harlan4096 — 11:55

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (43)ivyhuv

[-]
Online Staff
There are no staff members currently online.

>