home bbs files messages ]

Just a sample of the Echomail archive

Cooperative anarchy at its finest, still active today. Darkrealms is the Zone 1 Hub.

   ANTI_VIRUS      Anti-Virus Discussion & News      523 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 278 of 523   
   Ben Ritchey to All   
   US-CERT Alert   
   13 Oct 15 09:39:29   
   
   NCCIC / US-CERT   
      
   National Cyber Awareness System:   
      
   TA15-286A: Dridex P2P Malware   
   10/13/2015 07:23 AM EDT   
      
      
   Original release date: October 13, 2015   
      
   Systems Affected   
   Microsoft Windows   
      
   Overview   
      
   Dridex, a peer-to-peer (P2P) bank credential-stealing malware, uses a   
   decentralized network infrastructure of compromised personal computers and web   
   servers to execute command-and-control (C2). The United States Department of   
   Homeland Security (DHS), in collaboration with the Federal Bureau of   
   Investigation (FBI) and the Department of Justice (DOJ), is releasing this   
   Technical Alert to provide further information about the Dridex botnet.   
      
   Description   
   Dridex is a multifunctional malware package that leverages obfuscated macros   
   in Microsoft Office and extensible markup language (XML) files to infect   
   systems. The primary goal of Dridex is to infect computers, steal credentials,   
   and obtain money from victims’ bank accounts. Operating primarily as a banking   
   Trojan, Dridex is generally distributed through phishing email messages. The   
   emails appear legitimate and are carefully crafted to entice the victim to   
   click on a hyperlink or to open a malicious attached file. Once a computer has   
   been infected, Dridex is capable of stealing user credentials through the use   
   of surreptitious keystroke logging and web injects.   
      
   Impact   
      
   A system infected with Dridex may be employed to send spam, participate in   
   distributed denial-of-service (DDoS) attacks, and harvest users' credentials   
   for online services, including banking services.   
      
   Solution   
   Users are recommended to take the following actions to remediate Dridex   
   infections:   
      
   Use and maintain anti-virus software - Anti-virus software recognizes and   
   protects your computer against most known viruses. Even though Dridex is   
   designed to evade detection, security companies are continuously updating   
   their software to counter these advanced threats. Therefore, it is important   
   to keep your anti-virus software up-to-date (see Understanding Anti-Virus   
   Software for more information).   
   Change your passwords - Your original passwords may have been compromised   
   during the infection, so you should change them (see Choosing and Protecting   
   Passwords for more information).   
   Keep your operating system and application software up-to-date - Install   
   software patches so that attackers can't take advantage of known problems or   
   vulnerabilities. Many operating systems offer automatic updates. You should   
   enable automatic updates if this option is available (see Understanding   
   Patches for more information).   
   Use anti-malware tools - Using a legitimate program that identifies and   
   removes malware can help eliminate an infection. Users can consider employing   
   a remediation tool (examples below) to help remove Dridex from your system.   
          F-Secure   
      
          https://www.f-secure.com/en/web/home_global/online-scanner   
      
          McAfee   
      
          http://www.mcafee.com/uk/downloads/free-tools/stinger.aspx   
      
          Microsoft   
      
          http://www.microsoft.com/security/scanner/en-us/default.aspx   
      
          Sophos   
      
          https://www.sophos.com/en-us/products/free-tools/virus-removal-tool.aspx   
      
          Trend Micro   
      
          http://housecall.trendmicro.com/   
      
   The above are examples only and do not constitute an exhaustive list. The U.S.   
   Government does not endorse or support any particular product or vendor.   
      
   References   
   N/A   
   Revision History   
   Initial Publication - October 13, 2015   
      
   ----------------------------------------------------------------   
   -------------- -   
      
   This product is provided subject to this Notification and this Privacy & Use   
   policy.   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   A copy of this publication is available at www.us-cert.gov. If you need help   
   or have questions, please send an email to info@us-cert.gov. Do not reply to   
   this message since this email was sent from a notification-only address that   
   is not monitored. To ensure you receive future US-CERT products, please add   
   US-CERT@ncas.us-cert.gov to your address book.   
   OTHER RESOURCES:   
   Contact Us | Security Publications | Alerts and Tips | Related Resources   
   STAY CONNECTED:   
   Sign up for email updates   
      
   SUBSCRIBER SERVICES:   
   Manage Preferences  |  Unsubscribe  |  Help   
      
      
   ----------------------------------------------------------------   
   -------------- -   
   This email was sent to Fido4cmech@lusfiber.net using GovDelivery, on behalf   
   of: United States Computer Emergency Readiness Team (US-CERT) · 245 Murray   
   Lane SW Bldg 410 · Washington, DC 20598 · (888) 282-0870 Powered by GovDelivery   
      
   === Cut ===   
      
      
   --   
   Guardien Fide   :^)   
      
      Ben  aka cMech  Web: http://cmech.dynip.com   
                    Email: fido4cmech(at)lusfiber.net   
                 Home page: http://cmech.dynip.com/homepage/   
              WildCat! Board 24/7  +1-337-984-4794  any BAUD 8,N,1   
      
   --- GoldED+/W32-MSVC   
    * Origin: FIDONet - The Positronium Repository (1:393/68)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca