IBM X-Force researchers identified new financial malware, dubbed CamuBot, that attempts to camouflage itself as a security module required by the Brazilian banks it targets.
The mobile revolution has made it simpler and faster for banking customers to conduct financial transactions, but it has also expanded the attack surface for fraudsters aiming to steal sensitive data.
As security tools improve, malicious actors are increasingly operating as organized cybergangs and less sophisticated actors are falling behind, according to X-Force analysis of malware trends.
According to IBM's "Future of Identity Study," consumers are beginning to prioritize security over convenience, making trust a crucial competitive advantage for financial institutions.
IBM X-Force discovered a new overlay RAT malware that exploits the AutoIt framework to evade antivirus detection while perpetrating bank fraud in Brazil.
Cisco Talos discovered a new banking Trojan that exploits an authentic VMware binary to hide its malicious activities from security researchers.
A new, upgraded version of remote access malware Client Maximus points to the growing sophistication of cybercriminals in Brazil.
Financial institutions need intelligence-driven fraud detection and prevention solutions to protect customers' sensitive data from phishing attacks.
TrickBot Habla Español: Trojan Widens Its Attack Scope in Spain, Brings Redirection Attacks to Local Banks
The TrickBot Trojan has been steadily ramping up its activity this year, going into a rather intensive period of updates and attacks that started in Q2.
Amid a period of targetless activity, IBM X-Force researchers are wondering where the operators behind the Zeus Sphinx Trojan are planning to strike next.