Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
Cybercriminals who rely on remote control tactics to commit financial fraud may use hidden virtual network computing (hVNC) modules to cover their tracks.
GozNym continued its trip around Europe by launching redirection attacks against 13 German banks. The volume of these attacks has spiked in recent months.
IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.
The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.
The developers of the Gozi banking Trojan have built some improvements into the malware that now allow it to attack Windows 10 operating systems.
The latest version of the Gozi banking Trojan looks to target banks in Bulgaria. This could be just the first instance of the malware in Eastern Europe.
Two online banking fraud schemes, which defeat banks' one-time password (OTP) authorization systems, show how personal data is vulnerable through mobile.