Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Dyreza banker trojan seen bypassing SSL

Dyreza banker trojan seen bypassing SSL

2014/06/16

Threatpost - (International) Researchers identified a new banking trojan known as Dyre or Dyreza that uses browser hooking to intercept traffic moving between victims' systems and their intended Web site, allowing attackers to bypass SSL protections and redirect traffic through the attackers' servers. Researchers at CSIS Group found that the trojan is spread through spam messages and then contacts command and control servers, some of which are located in Latvia.

Source: http://threatpost.com/dyreza-banker-trojan-seen-bypassing-ssl/106671

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:20:33