• Skip to primary navigation
  • Skip to main content
  • Skip to footer
  • Home
  • Advertise With Us
  • Contact

TechWalls

Technology News | Gadget Reviews | Tutorials

  • Reviews
  • Tech Guide
  • Home Improvement
  • Gadget & Apps
  • Deals
  • News

Dridex Trojan targeting UK-based banks

By Guest Authors

Security researchers have found a new development with the Dridex Trojan, this time spotting that the attackers have refocused their aim at the banks based in the United Kingdom where large business accounts are being transacted.

It is almost as though the attacks made in recent weeks were not enough, where a great number of residents in the UK were targeted by infection campaigns that followed the release of an updated edition of the Dridex Trojan.

dridex-trojan

There is now a strong belief among security researchers that the newest version of the Dridex Trojan uses a network of bots called Andromeda that works to spread the infections across a vast span of computer networks.

In the beginning of the Trojan’s operations, only a few banks were affected by the infection. Days later, the number of banks targeted by the Trojan grew exponentially. It is barely any surprise that the attackers targeted banks in the UK, the Dridex Trojan being known to have a special fondness for high-value targets. In the case of the UK banks, the Trojan was interested in the business and corporate account access subdomains, according to researchers at IBM.

As with other tactics used by attackers, the Dridex Trojan works to lure potential victims into clicking a phony set of invoices that take on a Microsoft Office file format so that the Trojan is launched in the aftermath.

And then the Dridex Trojan redirects users to another website from the legitimate one when they would visit their bank’s website. The goal is to steal information about their login such as the username, password and email address. All this while the victims and the banks involved do not have any slight idea about what is going on in the background.

The Dridex Trojan brings the victims to a compromised site via local DNS poisoning instead of a local proxy such as those being used by other Trojans. There is nothing new about this technique, however. But it needs tremendous amount of preparation to perform. This preparation includes developing the exact replica of a website, in this case a bank’s site. This also requires a lot of investment, as it is necessary to trick the targeted victims.

Some security researchers believe that the developers behind Dridex bought site replicas from the Dyre team, another group of hackers that invented the older Dyre Trojan. It was reported in the past that government authorities from the FBI, US Justice Department and the National Crime Agency of UK took down a botnet associated with Dridex. But it appears the Trojan is still alive today.

Disclosure: We might earn commission from qualifying purchases. The commission help keep the rest of my content free, so thank you!

Footer

Oleap Archer AI Meeting Headset Review: Smart Assistant or Redundant Tech?

SUNSEEKER ELITE X7 Robot Lawn Mower Review – Does Automated Lawn Care Work?

OptiSolex 400W Portable SolarBag Kit Review

Linkind Smart Solar Spotlight SL5C Review – Solar Smarts Done Right

Follow TechWalls

YoutubeFacebookXInstagram

Recent Posts

  • Water from dishwasher backing up in the kitchen sink – How To Fix It?
  • Stop Leaking On the Nut of BrassCraft Compression Valve
  • Oleap Archer AI Meeting Headset Review: Smart Assistant or Redundant Tech?
  • Father’s Day Gift Idea: garden pond waterfalls and fountains

Copyright © 2025 · All Rights Reserved