A recent report claims the banking Trojan Dyreza has returned, and the new variant has features that target Windows...
10. What's different about Dyreza this time around, and how does it attack Windows 10?
Malware targeting Windows 10, or any version of Windows for that matter, shouldn't surprise anyone. While Windows 10 might still only be a small part of the Windows ecosystem, its presence is only going to grow and become a larger target. Windows 10 has undergone many security improvements, including providing the ability to manage software installed in the same way it is done on smartphone app stores. The app store functionality, however, is something an enterprise can optionally enable, so some of the same vulnerabilities as before will still exist, such as a user accidentally installing malware if he has administrative access or the ability to install software outside of the app store.
Dyreza is similar to the Zeus malware and has much of the same functionality, targeting online banking services in more than just the U.S. Dyreza exploits the same vulnerabilities that malware has been abusing for 20 years or more. It starts with a spam email, often riddled with spelling and grammar mistakes, telling the recipient to open an attachment or visit a certain URL. The attachment or URL will deliver the initial downloader malware to the system, so the rest of the malware can be installed. Once installed, the malware starts capturing the banking information and sending it to the attacker on the command-and-control servers. The updated Dyreza now also has functionality for disabling endpoint security software. Dyreza can also target Microsoft's new Web browser Edge.
Ask the Expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Learn about enterprise controls to defend against banking Trojan Dridex
Find out if your enterprise should make the upgrade to Windows 10
Read more about how banking malware Vawtrak bypasses two-factor authentication
Dig Deeper on Microsoft Windows security
Related Q&A from Nick Lewis
Researchers developed aIR-Jumper, an exploit that leverages lights within security cameras to extract data. Learn how this attack works and how to ... Continue Reading
The com.google.provision virus reportedly targets Android users, but little is known about it. Nick Lewis discusses the mystery threat and how Common... Continue Reading
A bug in Microsoft's Internet Explorer update exposes information that users enter into the browser's address bar. Learn more about the bug and URL ... Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.