Security News > 2020 > January > Evil Corp Returns With New Malware Infection Tactic

Evil Corp Returns With New Malware Infection Tactic
2020-01-31 22:23

Cybercrime group Evil Corp is back in action after a short hiatus, with a technique in its arsenal not previously used by the group to distribute malware.

Previously, Evil Corp would distribute malware without HTML redirects, merely using malicious attachments or malicious URLs - which are more easily detected by defensive tools - in emails.

Evil Corp has distributed GraceWire in previous campaigns the group is best-known for deploying the banking trojan Dridex, sent via phishing emails.

Evil Corp is a hacking group that has allegedly stolen millions of dollars from victims using the Dridex banking trojan and, previously, the Zeus malware.

Evil Corp has been on a hiatus since December, when feds started cracking down on the group: U.S. authorities offered up $5 million for information leading to the arrest of Evil Corp. leader Maksim V. Yakubets, 32, of Russia, who goes under the moniker "Aqua." Separately, the U.S. Treasury Department on Thursday issued sanctions against Evil Corp, "As part of a sweeping action against one of the world's most prolific cybercriminal organizations."


News URL

https://threatpost.com/evil-corp-returns-with-new-malware-infection-tactic/152430/