Press ESC to close

Grandoreiro, the global trojan with grandiose goals

CategoryDetails
Threat ActorsBrazilian cybercriminal group operating Grandoreiro, part of the Tetrade umbrella.
Campaign OverviewBanking trojan targeting financial institutions, using phishing, malvertising, and sophisticated techniques for fraudulent banking operations. Evolving since 2016.
Target Regions (Victims)Initially focused on Latin America and Europe; expanded to 45 countries and territories in 2024.
MethodologyPhishing emails, malvertising (Google Ads), malicious ZIP archives, DLL sideloading, fake software certificates.
Product TargetedFinancial institutions, banking websites, and cryptocurrency wallets.
Malware ReferenceGrandoreiro banking trojan, also known as a part of the Tetrade family.
Tools UsedWindows Installer (MSI), Portable Executable (EXE), DLL sideloading, XOR-based encryption, digital certificates.
Vulnerabilities ExploitedEvading detection through file size inflation (binary padding), low detection rates, using digital certificates to impersonate legitimate software.
TTPsPhishing, social engineering, malvertising, malware-as-a-service, DLL sideloading, XOR-based encryption, binary padding to evade sandboxes.
AttributionBrazilian threat actor group, part of the Tetrade umbrella.
RecommendationsImprove email filtering, monitor for abnormal file sizes and encryption schemes, use endpoint detection and response (EDR) to detect DLL sideloading.
SourceSecurelist by Kaspersky

Read full article : https://securelist.com/grandoreiro-banking-trojan/114257/

The above summary has been generated by an AI language model

Leave a Reply

Your email address will not be published. Required fields are marked *