Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Dyre banking malware uses 285 command and control servers

Dyre banking malware uses 285 command and control servers

2015/06/24

Softpedia - (International) Security researchers from Symantec released a report revealing that multiple groups are running at least 285 command and control (C&C) servers as well as 44 machines to deliver payloads and execute man-in-the-browser (MitB) attacks. The servers are located primarily in Ukraine and Russia but located worldwide, and are primarily targeting financial organizations in the U.S. and United Kingdom.

Source: http://news.softpedia.com/news/dyre-banking-malware-uses-285-command-and-control-servers-485119.shtml

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:24:33