Since mid-October 2014, a phishing campaign has targeted a wide variety of recipients while employing the Dyre/Dyreza banking malware. Elements of this phishing campaign vary from target to target including senders, attachments, exploits, themes, and payload(s). Although this campaign uses various tactics, the actor’s intent is to entice recipients into opening attachments and downloading malware.
The Dyre banking malware specifically targets sensitive user account credentials. The malware has the ability to capture user login information and send the captured data to malicious actors. (link is external) Phishing emails used in this campaign often contain a weaponized PDF attachment which attempts to exploit vulnerabilities found in unpatched versions of Adobe Reader. (link is external) (link is external) After successful exploitation, a user’s system will download Dyre banking malware. All of the major anti-virus vendors have successfully detected this malware prior to the release of this alert. (link is external)
Please note, the below listing of indicators does not represent all characteristics and indicators for this campaign.
Phishing Email Characteristics:
- Subject: “Unpaid invoic” (Spelling errors in the subject line are a characteristic of this campaign)
- Attachment: Invoice621785.pdf