A new campaign targets organisations in Mexico and Spain, intending to deliver the Grandoreiro banking trojan.
“In this campaign, the attackers mimic officials from Mexico City’s Attorney General’s Office and the Public Ministry to entice people to download and run ‘Grandoreiro,’ a serious bank malware that has been active since at least 2016 and is targeted exclusively at individuals in Latin America.” according to a report from Zscaler.
The ongoing assaults began in June 2022 and have been linked to the automobile, civil, and industrial construction, transportation and logistics, and machinery sectors in Mexico and Spain’s chemicals manufacturing sectors.
“This campaign is a great example of how cybercriminals will impersonate well-known, credible institutions to deliver malware. It also highlights the importance of employee education in avoiding these types of attacks,” said Tony Giandomenico, a principal security analyst at Zscaler.
The Grandoreiro banking trojan has been used in several different campaigns over the years. It is known for its ability to steal online banking credentials and other personal information.
“The malware has been delivered via phishing emails that impersonate Mexican and Spanish officials. The emails contain a .zip attachment that, when opened, downloads an executable file that installs the Grandoreiro malware on the victim’s machine. Once installed, the malware will attempt to steal sensitive information from the infected computer, including online banking credentials, credit card information, and more,” Giandomenico said.
“This campaign is a great example of how cybercriminals constantly evolve their tactics to stay one step ahead of security defences. It’s important for organisations to be aware of these threats and have the proper security measures in place to protect themselves and their data,” he added.
Organisations in Mexico, Spain, and the rest of the world should be on high alert for this campaign and take steps to ensure that their employees are educated on how to spot and avoid phishing emails. Zscaler recommends that organisations deploy a comprehensive security solution that includes advanced email security, web filtering, and malware analysis to protect against these threats.
More Stories
Killnet and AnonymousSudan Collaborate to Launch Cyber Attacks on Western Organisations
In recent news, it has been reported that two Russia-sympathetic hacktivist groups, Killnet and AnonymousSudan, have allegedly launched a series...
$4000 Gone In An Instant: Mother Defrauded in Facebook Marketplace Car Deal
A mother of four is warning others to be cautious after believing she had purchased a safe and dependable car...
Shocking Scam: Sydney Family Loses $200K Life-Savings in Suncorp Spoofing Fraud
A family from Sydney has lost their life savings worth $200,000 due to a fraudulent scam. Peter and Madison, who...
Mysterious Money Transfer Leaves Couple Speechless: How They Got an Unsolicited $4000
A young couple in Melbourne claims their bank is making up a personal loan they do not understand. Ashley and...
Phishing + AI + Voice Cloning= Big Trouble: The New Way Criminals are Stealing Your Money
New Alert: Criminals use AI and voice cloning to trick you out of your money. Earlier this year, Microsoft unveiled...
‘Impossible to Spot’ Delivery Scam Email Targets Australia Post Customers – Don’t Fall Victim!
Unsuspecting shoppers should be cautious as a parcel delivery scam that is hard to distinguish targets Australia Post customers. Email...