SecurityScorecard Releases Security Benchmark Report, Finds Banking Malware Targets Employees, And Partner Company Employees, Across All Industries

First half 2015 report findings identify top three banking malware families are direct variants of Zeus or mimic Zeus-like functionalities

Jul 01, 2015, 10:30 ET from SecurityScorecard

NEW YORK, July 1, 2015 SecurityScorecard, the leading non-intrusive threat benchmarking platform that allows companies to holistically identify, mitigate and prevent security threats in real time, released a major research report which explores the current state of banking malware for the first half of 2015. The study finds the primary motivator behind banking malware attacks is to capture credentials, financial data, and personal information from employees, and partner company employees, across industries. Then apply this stolen information in fraudulent wire transfers or fake automated clearing house (ACH) transactions to steal funds.

SecurityScorecard sinkholes found 11,952 infections affecting 4,702 organizations and identified the top banking malware families to be Dridex, Bebloh and TinyBanker. The key findings include:

  • These malware families are simple in functionality which is proving to be more profitable than more complex techniques and methods, such as taking antiquated, bloated code bases from third party malware coders.
  • Dridex is the most prolific Trojan being circulated within the corporate sector.
  • The use of banking malware is not limited to large financial institutions, though they remain the primary targets.
  • Dridex spreading campaigns appear to be orchestrated by more advanced actors with an interest in targeted attacks.
  • The healthcare industry experienced lowest rate of Bebloh infections, but did not experience the same rate of infection as other industries.

"Security awareness and education is never enough. The evolving tools, techniques, and procedures that are continuously honed by malicious actors make it nearly impossible for every individual in an enterprise to be aware of the latest attack method," said Alex Heid, Chief Research Officer of SecurityScorecard. "To prevent financial losses from an attack, businesses need a closed loop of communication between partners, suppliers, and all third parties that are impacted by banking malware. It is critical that companies think about their collective information security ecosystem when gauging their own security risk."

To gather these insights, SecurityScorecard's research and development team analyzed banking malware and discovered distinct patterns of obfuscation and multiple, evolving malicious code bases. They found that the top three banking malware families being captured are all direct variants of Zeus, or mimic Zeus-like functionalities. These malware attacks are the preferred method of obtaining stolen credentials, especially when traditional attacks on web applications or network-based attacks are being monitored by internal security teams.

SecurityScorecard will continue to publish insights from its growing stream of  proprietary data each quarter. The full report can be downloaded here: For more on SecurityScorecard, visit the SecurityScorecard blog:

About SecurityScorecard 

SecurityScorecard provides precise global threat intelligence and risk awareness continuously and non-intrusively so businesses and their partners can collaboratively predict and remediate data security issues. SecurityScorecard customers are Fortune 500 leaders in financial services, retail, healthcare and manufacturing industries including Trinet, Gilt Groupe, Deerfield Management, Shutterstock, and Harry's. SecurityScorecard was founded in 2013 by CEO Dr. Aleksandr Yampolskiy and COO Sam Kassoumeh, both former Gilt Groupe heads of security and compliance, and is headquartered in New York.  SecurityScorecard investors include Sequoia Capital, Evolution Equity Partners, Boldstart Ventures, Atlas Ventures and others.






SOURCE SecurityScorecard