Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Dridex

From Wikipedia, the free encyclopedia
Computer malware
Dridex
TypeTrojan
SubtypeBanking trojan
AuthorsNecursMaksim Yakubets

Dridex, also known asBugat andCridex, is a type ofmalware that specializes in stealing bank credentials through a system that utilizesmacros fromMicrosoft Word.[5]

It primarily targetsWindows users who open maliciousemail attachments in Word orExcel, triggering macros that download Dridex and infect the system, exposing the user to banking theft.

Dridex is designed to steal banking information[6] from infected machines and immediately launchfraudulent transactions. It installs a keyboard logger and performsinjection attacks to capture sensitive data.

History

[edit]

Dridex first appeared in 2012 as an evolution of the earlier Cridex and Bugat banking trojans. It incorporated elements of its predecessors’ code but introduced apeer-to-peer (P2P) communication architecture to enhance concealment and redundancy.[7]

By 2015, it had become one of the most prevalent financial malware strains, particularly targeting banking credentials through email-based phishing campaigns and malicious macro-laden attachments.[7] That year, theft attributed to Dridex was estimated at £20 million in the United Kingdom and $10 million in the United States, with attacks reported in more than 20 countries. In early September 2016, researchers observed the malware beginning to targetcryptocurrency wallets.[8]

In 2017, Dridex was distributed through a widespread phishing campaign that exploited a Microsoft Wordzero-day vulnerability. This method allowed infection without requiring users to enable macros and affected millions of users globally.[9] Around the same time, newer versions of Dridex began exploiting a vulnerability in Microsoft Office and WordPad that allowedremote code execution.[7]

In December 2019, US authorities filed charges against two suspects believed to have created the Dridex malware, including the group's alleged leader.[10]

In 2022, IBM researchers found similarities between the Raspberry Robin worm and Dridex malware loaders. Their comparative analysis showed that both used similar string decoding algorithms, anti-analysis techniques, and payload decryption routines. IBM suggested that Evil Corp may be using Raspberry Robin infrastructure to carry out attacks.[11]

Evil Corp

[edit]
Not to be confused withEvil corporation.

Evil Corp (also known asDridex andINDRIK SPIDER), the group behind the Dridex malware, is a Russianhacking group that has been active since 2009.[12] Evil Corp operated with a hierarchical structure similar to traditional organized crime groups rather than typical cybercriminal networks. Its leader,Maksim Yakubets, ran the operation out of Moscow with the involvement of family members, including his father, brother, and cousins. The group invested heavily in laundering operations and maintained a tight-knit internal culture, regularly socializing and vacationing together.[13] Yakubets was a personal friend of core member or leader of theJabber Zeus hacking group Vyacheslav Penchukov, who was later arrested and imprisoned in the US. Asked if Russian hacking groups worked with Russian security services, as often accused in the West, Penchukov said: "Of course".[14]

In 2019, the USFederal Bureau of Investigation (FBI) named nine alleged members of the group, accusing them ofextorting orstealing over $100,000,000 through hacks that affected 40 countries.[15] That same year, theUnited States Department of the Treasury imposedsanctions on the group,[16] and theOffice of Foreign Assets Control (OFAC) banned individuals in the U.S. from engaging in transactions with them.[17] People outside the US may be subject to secondary sanctions for facilitating significant transactions with the group.[17] The US government also charged two members and offered a $5 million reward for information leading to their arrest.[17]

As a consequence of the 2019 US and UK sanctions, Evil Corp was forced to alter its tactics. Facing increased scrutiny and legal risk, members abandoned online accounts, restricted their movements, and ceased using Dridex malware. The group adopted alternative access tools like SocGholish and began deploying a rotating set of ransomware strains, including WastedLocker and Hades, to conceal their identity and continue operations.[13]

In November 2021, theBBC reported that two alleged leaders of Evil Corp were living openly in Russia.[15][18] The following month, analysts at Emsisoft suggested that a ransomware attack initially attributed to REvil may have been the work of Evil Corp.[17]

In June of 2022, cybersecurity firmMandiant reported that Evil Corp had begun using off-the-shelf ransomware, such asLockBit, to disguise its identity and evade sanctions.[17] Mandiant also linked the group to threat actor UNC2165.[17]

Between 2022 and 2024, Evil Corp diversified its tactics and began affiliating with other ransomware groups, including LockBit. The group continued its use of SocGholish as its primary initial access tool. The UK’sNational Crime Agency (NCA) identified Aleksandr Ryzhenkov, a senior figure in Evil Corp, as a LockBit affiliate involved in ransomware attacks. In February 2024, LockBit was disrupted by an international law enforcement operation led by the NCA, known as Operation Cronos. Some Evil Corp members remain active in Russia; in December 2022, Igor Turashev and his company placed third in a hackathon organized by theWagner Group.[13]

See also

[edit]

References

[edit]
  1. ^"Cyberthreats, viruses, and malware - Microsoft Security Intelligence".Microsoft.
  2. ^"Trojan.Dridex".
  3. ^"Search - Threat Encyclopedia".
  4. ^"Fortiguard".
  5. ^"Someone Hijacks Botnet Network & Replaces Malware with an Antivirus". 2016-02-04. Retrieved2017-01-11.
  6. ^Jeremy Kirk (2016-01-19)."Dridex banking malware adds a new trick".PCWorld. Retrieved2017-01-11.
  7. ^abc"Dridex Malware".U.S. Cybersecurity and Infrastructure Security Agency (CISA). 30 June 2020. Retrieved22 April 2025.
  8. ^Catalin Cimpanu (2016-09-07)."Dridex Banking Trojan Will Soon Target Crypto-Currency Wallets".Softpedia. Retrieved2017-01-11.
  9. ^"Microsoft Word 0-day used to push dangerous Dridex malware on millions".Ars Technica. 11 April 2017. Retrieved20 April 2025.
  10. ^Cimpanu, Catalin (December 5, 2019)."US charges two members of the Dridex malware gang".ZDNet. RetrievedDecember 8, 2019.
  11. ^"Raspberry Robin and Dridex: Two birds of a feather".IBM. 1 September 2022. Retrieved20 April 2025.
  12. ^Mujezinovic, Damir (2021-09-10)."Evil Corp: A Deep Dive Into One of the World's Most Notorious Hacker Groups".MakeUseOf.Archived from the original on 2021-09-10. Retrieved2021-11-23.
  13. ^abc"Evil Corp: Behind the Screens".U.K. National Crime Agency (NCA). October 2024. Retrieved21 April 2025.
  14. ^Tidy, Joe (10 November 2025)."Tank interview: A hacking kingpin reveals all to the BBC". BBC News.
  15. ^abTidy, Joe (2021-11-17)."Evil Corp: 'My hunt for the world's most wanted hackers'".BBC News. Retrieved2021-11-23.
  16. ^"Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware".U.S. Department of the Treasury. December 5, 2019.Archived from the original on 2019-12-05. Retrieved2021-11-23.
  17. ^abcdefBurt, Jeff (2022-06-03)."Even Russia's Evil Corp now favors software-as-a-service".The Register. Retrieved2022-06-04.
  18. ^White, Debbie (November 17, 2021)."Hackers accused of stealing $100m live openly in Russia".The Times.ISSN 0140-0460. Retrieved2021-11-23.


Hacking in the 2020s
← 2010sTimeline2030s →
Major incidents
2020
2021
2022
2023
2024
2025
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2020
2021
2022
2025
Hacking in the 2010s
Major incidents
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Hacktivism
Groups
Individuals
Majorvulnerabilities
publiclydisclosed
Malware
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Retrieved from "https://en.wikipedia.org/w/index.php?title=Dridex&oldid=1321418049"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp