1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Dyre Trojan Uses Semi-Random File Names to Evade Detection

Discussion in 'SecurityWeek' started by RSS, Aug 24, 2015.

  1. RSS

    RSS New Member Member

    The creators of the notorious Dyre banking Trojan have started using some new techniques to make the malware more difficult to detect and remove.

    According to researchers at IBM, the developers of Dyre have decided to modify the threat’s persistence mechanism and replace run keys in the Windows Registry with task scheduling.

    read more

    [​IMG] [​IMG] [​IMG] [​IMG] [​IMG] [​IMG] [​IMG] [​IMG]

    Continue reading...

Share This Page