A recent report claims the banking Trojan Dyreza has returned, and the new variant has features that target Windows...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
10. What's different about Dyreza this time around, and how does it attack Windows 10?
Malware targeting Windows 10, or any version of Windows for that matter, shouldn't surprise anyone. While Windows 10 might still only be a small part of the Windows ecosystem, its presence is only going to grow and become a larger target. Windows 10 has undergone many security improvements, including providing the ability to manage software installed in the same way it is done on smartphone app stores. The app store functionality, however, is something an enterprise can optionally enable, so some of the same vulnerabilities as before will still exist, such as a user accidentally installing malware if he has administrative access or the ability to install software outside of the app store.
Dyreza is similar to the Zeus malware and has much of the same functionality, targeting online banking services in more than just the U.S. Dyreza exploits the same vulnerabilities that malware has been abusing for 20 years or more. It starts with a spam email, often riddled with spelling and grammar mistakes, telling the recipient to open an attachment or visit a certain URL. The attachment or URL will deliver the initial downloader malware to the system, so the rest of the malware can be installed. Once installed, the malware starts capturing the banking information and sending it to the attacker on the command-and-control servers. The updated Dyreza now also has functionality for disabling endpoint security software. Dyreza can also target Microsoft's new Web browser Edge.
Ask the Expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Learn about enterprise controls to defend against banking Trojan Dridex
Find out if your enterprise should make the upgrade to Windows 10
Read more about how banking malware Vawtrak bypasses two-factor authentication
Dig Deeper on Microsoft Windows security
Related Q&A from Nick Lewis
The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from ...continue reading
Typosquatting was used by threat actors to spread malware in the NPM registry. Learn from expert Nick Lewis how this method was used and what it ...continue reading
Threat actors are using phishing email campaigns to fool users with tech support scams and fake Blue Screens of Death. Learn how these campaigns work...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.