Dridex was developed by cybercriminals to harvest online banking details, which are then used to steal money from individuals and businesses worldwide, Europol says.
October 15, 2015
Europol's European Cybercrime Centre is actively supporting the National Crime Agency and the FBI in activities aimed at taking down Dridex banking malware that has inflicted an estimated 20 million pounds ($31 million) of losses in the U.K. alone.
A Europol press release said that Dridex — considered the successor of Cridex banking malware — was developed by technically skilled cybercriminals in Eastern Europe to harvest online banking details, which are then exploited to steal money from individuals and businesses worldwide. Global financial institutions and a variety of different payment systems have been particularly targeted by this malware.
Computers become infected with Dridex malware when users receive and open documents in seemingly legitimate emails. The malware most frequently infects users running Windows operations systems, the release said.
With the support of international law enforcement and private partners, the NCA is working to "sinkhole" the malware, preventing infected computers, or botnets, from communicating with the cybercriminals controlling them. The FBI is working on a U.S. sinkhole, as well.
The release included a reminder to the public to be vigilant and not to open email attachments or click on links in emails if they are unexpected or their origin is unclear.
For those who suspect that their computer has been infected, EC3 recommends downloading specialist disinfection software.