IBM Research — Haifa Labs detected yet another malware campaign, dubbed EmbusteBot, designed to target dozens of financial institutions in Brazil.
According to the IBM X-Force Threat Intelligence Index for 2017, commercial malware made a notable comeback in 2016 and remains a top threat in 2017.
After being spurned by his cybercriminal peers on underground forums, the creator of NukeBot apparently leaked the banking Trojan's source code.
X-Force researchers revealed the cybergang behind Gootkit had upgraded the banking Trojan with new network interception and certificate bypass methods.
IBM X-Force researchers discovered that an upgraded version of Dridex has been using a new injection method, signifying the Trojan's continued evolution.
Threat actors with apparent ties to the Lazarus cybergang launched an attack against Polish banks that may be part of a broader, global campaign.
Researchers discovered a new banking malware that targets users' sensitive information and cryptocurrency wallets through phishing emails.
IBM X-Force researchers discovered a new malware called Client Maximus that contains advanced code written specifically to attack banks in Brazil.
Cybercrime gangs continued to target the financial services sector during the second half of 2016 with a variety of high-profile attacks.
Instead of sending phishing emails to millions of random users, the Dridex malware infection is now targeting a smaller number of large financial services.