Lumension® Endpoint Intelligence Center

Intelligence Center » News Archive » Dyre trojan uses semi- random file names to evade detection

Dyre trojan uses semi- random file names to evade detection

2015/08/24

Securityweek - (International) Security researchers at IBM discovered that the developers of the Dyre banking trojan modified the malware's persistence mechanism by making its execution a Microsoft Windows scheduled task, and assigned semi-random filenames to the trojan's configuration files to evade detection.

Source: http://www.securityweek.com/dyre-trojan-uses-semi-random-file-names-evade-detection

Note: This news synopsis is taken from the DHS Daily Open Source Infrastructure Report, a daily [Monday through Friday, except US Federal holidays] summary of open-source published information concerning significant critical infrastructure issues; a 10-day archive of the DOSIR can be found at: http://www.dhs.gov/dhs-daily-open-source-infrastructure-report.


Last Updated: 27 May 2016 10:25:05