Article Details
Scrape Timestamp (UTC): 2024-05-18 22:20:44.550
Original Article Text
Click to Toggle View
Banking malware Grandoreiro returns after police disruption. The Android banking trojan "Grandoreiro" is spreading in a large-scale phishing campaign in over 60 countries, targeting customer accounts of roughly 1,500 banks. In January 2024, an international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Bank announced the disruption of the malware operation, which had been targeting Spanish-speaking countries since 2017 and caused $120 million in losses. At the same time, five arrests and thirteen search and seizure actions occurred across Brazil. However, no information was provided on the arrested individuals' roles in the operation. IBM's X-Force team reports that Grandoreiro appears to have returned to large-scale operations since March 2024, likely rented to cybercriminals via a Malware-as-a-Service (MaaS) model, and now targeting English-speaking countries too. Additionally, the trojan itself has undergone a technical revamp that added many new powerful features and improvements, indicating that its creators evaded arrest and weren't deterred by the previous crackdown. New phishing campaigns Since multiple threat actors rent the malware, the phishing lures are diverse and crafted specifically for the organizations a particular cybercriminal is targeting. Phishing emails seen by IBM impersonate government entities in Mexico, Argentina, and South Africa, mainly tax administration organizations, revenue services, and federal electricity commissions. The emails are written in the recipient's native language, incorporate official logos and formats, and contain a call to action, such as clicking links to view invoices, account statements, or tax documents. When recipients click on those emails, they are redirected to an image of a PDF that triggers the download of a ZIP file containing a bloated (100 MB) executable, which is the Grandoreiro loader. New Grandoreiro features IBM X-Force noticed several new features and significant updates in the latest variant of the Grandoreiro banking trojan, making it a more evasive and effective threat. These can be summarized in the following: Another notable new feature is Grandoreiro's ability to perform detailed victim profiling and decide whether or not it will execute on the device, which gives operators better control of their targeting scope. IBM analysts report that the latest version of the trojan avoids execution in specific countries like Russia, Czechia, the Netherlands, and Poland, as well as on Windows 7 machines in the United States where no antivirus is active. The above clearly indicates that despite the recent law enforcement action, Grandoreiro is alive and kicking, and unfortunately, it looks stronger than ever.
Daily Brief Summary
"Grandoreiro," a notorious banking malware, is actively targeting roughly 1,500 banks in over 60 countries via a large-scale phishing campaign.
Originally focused on Spanish-speaking nations and causing estimated losses of $120 million, the operation was disrupted in January 2024 by an international effort led by Brazil and Spain in collaboration with Interpol.
Despite a crackdown that resulted in five arrests, Grandoreiro reemerged in March 2024, now targeting English-speaking regions, indicating its operators likely evaded capture.
The malware is possibly being distributed under a Malware-as-a-Service (MaaS) model, facilitating its use by various cybercriminals with diverse phishing tactics tailor-made to victim demographics.
Newly added phishing schemes now fraudulently impersonate government entities in Mexico, Argentina, and South Africa, tricking users into downloading malware through seemingly legitimate emails.
Significant technical enhancements in the malware increase its evasion capabilities, allow detailed victim profiling, and restrict its operation in certain regions and under specific tech conditions on the victims' devices.
The revival and advancement of Grandoreiro underline the persistent and adaptive nature of cyber threats, demonstrating improved sophistication and international reach.