Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Dyre trojan caught in the cookie jar

Dyre trojan caught in the cookie jar

2014/09/18

Threatpost - (International) An analysis by Adallom researchers found that a new variant of the Dyre banking trojan is targeting login credentials for large banks and corporate accounts. The new variant is capable of stealing client certificates and browser cookies, potentially acquiring the same account persistence for attackers as that held by legitimate users.

Source: http://threatpost.com/dyre-trojan-caught-in-the-cookie-jar/108373

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:21:45