grandeduc - Fotolia
A recent report claims the banking Trojan Dyreza has returned, and the new variant has features that target Windows 10. What's different about Dyreza this time around, and how does it attack Windows 10?
Malware targeting Windows 10, or any version of Windows for that matter, shouldn't surprise anyone. While Windows 10 might still only be a small part of the Windows ecosystem, its presence is only going to grow and become a larger target. Windows 10 has undergone many security improvements, including providing the ability to manage software installed in the same way it is done on smartphone app stores. The app store functionality, however, is something an enterprise can optionally enable, so some of the same vulnerabilities as before will still exist, such as a user accidentally installing malware if he has administrative access or the ability to install software outside of the app store.
Dyreza is similar to the Zeus malware and has much of the same functionality, targeting online banking services in more than just the U.S. Dyreza exploits the same vulnerabilities that malware has been abusing for 20 years or more. It starts with a spam email, often riddled with spelling and grammar mistakes, telling the recipient to open an attachment or visit a certain URL. The attachment or URL will deliver the initial downloader malware to the system, so the rest of the malware can be installed. Once installed, the malware starts capturing the banking information and sending it to the attacker on the command-and-control servers. The updated Dyreza now also has functionality for disabling endpoint security software. Dyreza can also target Microsoft's new Web browser Edge.
Ask the Expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)
Learn about enterprise controls to defend against banking Trojan Dridex
Find out if your enterprise should make the upgrade to Windows 10
Read more about how banking malware Vawtrak bypasses two-factor authentication
Dig Deeper on Microsoft Windows security
Related Q&A from Nick Lewis
Enterprises have many options for email security best practices, ranging from deploying email security protocols to educating end users on the ... Continue Reading
Cyberattacks often begin with a port scan attack, which attackers use to find exploitable vulnerabilities on targeted systems. Learn how they work ... Continue Reading
Monitoring process memory is one way to combat fileless malware attacks. Here's what you can do to protect your network against these campaigns. Continue Reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.