A Case Study on Dridex Banking Malware

A form of malware called Dridex is targeting finance employees at small to midsize companies. The criminals are sending emails with Microsoft Word and Excel attachments. The emails are very targeted and trick the employee into opening the attachment. Once the employee opens the attachment and enables macros the malware infects the computer. It sits on the computer and waits to steals valuable information such as banking login credentials. It can also steal other login credentials to social media accounts etc.

Fujitsu has a very good video on a Dridex Case Study. Worth sharing with clients and colleagues!


 

Are you providing Security Training to your Clients?

badge w light burst white (1)
Exclusively for Our MSP Partners

Now Available: Gen AI Certification From BSN

Lead Strategic AI Conversations with Confidence

Breach Secure Now’s Generative AI Certification helps MSPs simplify the AI conversation, enabling clients to unlock the value of gen AI for their business, build trust, and drive growth – positioning you as a leader in the AI space.

More on blogs

Turning Output Overwhelm Into Productivity

Can AI Productivity Become Too Much? The Rise of Output Overwhelm

AI is helping teams move faster than ever, but more output doesn’t always mean more progress. As idea generation accelerates, many organizations are struggling to

5 Real Incidents That Show How AI Can Accidentally Leak Company Data

Employees are using AI tools like ChatGPT to work faster, but without oversight, it’s creating a new risk called Shadow AI. From leaked source code
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: