In 2018, IBM X-Force researchers observed organized cybercrime groups collaborating, rather than competing over turf or even attacking each other, for the first time.
Security researchers recently identified two malware distribution campaigns that infect customers of Brazilian financial institutions with banking Trojans.
A PowerShell malware downloader known as sLoad uses geofencing, customized emails and device reconnaissance to identify high-value Trojan targets.
A new campaign involving the Ramnit botnet that infected 100,000 computers over a two-month period may foreshadow an even larger attack, researchers warn.
Gozi took a larger slice of the financial malware pie and become the most active banking Trojan in 2017, according to the IBM X-Force Threat Intelligence Index 2018.
Global cybercrime actors test their malware in small settings before launching internationally, leaving trails of clues to tip off astute security teams.
After an eight-month period of dormancy, the Ramnit Trojan has resurfaced to attack the customers of six major banks in the U.K.
The Ramnit banking Trojan and botnet was previously taken down by law enforcement, but it appears to have re-emerged as a threat across the world.
Trusteer's security team has recently identified a new malware variant in a Russian cyber crime forum known as the i2Ninja malware.
If fraudsters can't deceive users, their business fails. Malware now requires perfectionism and hackers are beefing up their social engineering tactics.