Security researchers discovered a malspam campaign targeting British computer users with the Ursnif/Gozi/ISFB Trojan.
Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
The latest IBM X-Force report highlighted threats stemming from misconfigured cloud servers and inadvertent insider negligence and examined malware trends from 2017 that could continue into 2018.
The Ursnif banking Trojan began targeting financial institutions in Japan during Q3 2017 and continues to operate in the region as we enter Q4.
IBM X-Force researchers recently observed a massive drop in Neverquest malware campaigns. Is it the end of an era for this Trojan?
Cybercriminals who rely on remote control tactics to commit financial fraud may use hidden virtual network computing (hVNC) modules to cover their tracks.
GozNym continued its trip around Europe by launching redirection attacks against 13 German banks. The volume of these attacks has spiked in recent months.
IBM X-Force researchers recognized that the GozNym banking malware leverages features from two types of malware to make it double the threat.
Cybercriminals are adding some designer touches to their malware campaigns to make them more targeted and increase the overall success rate.
The new GozNym hybrid takes the best of both the Nymaim and Gozi ISFB malware to create a powerful Trojan targeting banks in the U.S. and Canada.