Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Dridex banking malware dodges detection with run-on-close macros

Dridex banking malware dodges detection with run-on-close macros

2015/03/23

Securityweek - (International) Security researchers at Proofpoint discovered that the Dridex banking malware is using run-on-close macros in infected Microsoft Office documents to avoid detection by malware sandboxes and antivirus software. The Dridex malware was previously linked to attacks targeting banking customers in the U.S., Canada, and the U.K.

Source: http://www.securityweek.com/dridex-banking-malware-dodges-detection-run-close-macros

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:23:49