A Case Study on Dridex Banking Malware

A form of malware called Dridex is targeting finance employees at small to midsize companies. The criminals are sending emails with Microsoft Word and Excel attachments. The emails are very targeted and trick the employee into opening the attachment. Once the employee opens the attachment and enables macros the malware infects the computer. It sits on the computer and waits to steals valuable information such as banking login credentials. It can also steal other login credentials to social media accounts etc.

Fujitsu has a very good video on a Dridex Case Study. Worth sharing with clients and colleagues!



Are you providing Security Training to your Clients?


More on blogs

Helping Clients Navigate AI-Powered Business Email Compromise: Turning Risk Into Readiness

Ensuring AI Readiness with AIRIA: A Roadmap for MSPs

Explore how AIRIA enhances AI readiness for MSPs. Discover the transformative benefits of integrating generative AI with our webinar. Boost productivity and strategic alignment for
Take the First Step

Experience Training That Makes a Difference

during the demo you’ll:

Take the First Step

Experience Training That Makes a Difference

During the demo you’ll: