Raytheon | Websense® Security Labs™ has been tracking malicious email campaigns associated with the Dridex banking Trojan since 2014. An interesting development this past week was a regional move to target Australia. Dridex botnet 220 related email were being sent to potential victims in the land down under. This is a change from the recent months, when Dridex botnet 220 campaigns have displayed a heavy bias towards U.K.-based potential victims.
The threat landscape is constantly evolving, but in some ways there are fewer changes, or even attempts to camouflage, than you might expect: Bad actors often host and launch their malicious campaigns from the same locations, making pockets of the Internet akin to a really bad neighborhood with gangs sharing headquarters.
Follow us on SpiceWorks
We want to hear from you!