Dyranges

By GoldSparrow in Trojans

Dyranges is among the most popular information collecting Trojans. Dyranges is used to collect information from infected computers. The most common use for the Dyranges Trojan is as a banking Trojan, that is, a threat infection used to collect online banking information. For example, Dyranges may be used to collect online banking usernames and passwords, credit card numbers, and other banking information. Dyranges targets a comparatively small list of banks when compared to other banking Trojans. However, Dyranges is highly effective at its task: collecting the victims' money. Dyranges is a high-level threat that should be removed at once. Dyranges uses advanced techniques to hide from detection and removal. Due to this, PC security experts recommend the use of various anti-malware strategies and programs. A cutting-edge security software is essential for removing Dyranges from an infected computer completely.

Dyranges Represents an Improvement on the Tactics Used by Banking Trojans

Dyranges has various aliases, including Dyre and Dyzap. This threat infection belongs to a newer generation of banking Trojans, first released in 2014. Dyranges was first seen in the Summer of 2014, with threat campaigns extending into present time. There are several ways in which Dyranges is installed on an infected computer. The most common way of distributing Dyranges is through the use of spam messages sent using other types of Trojans. One threat infection, in particular, Cutwail, has been associated with spam email messages used to distribute Dyranges. In most cases, these spam email messages contain disguised links to files contained in the cloud, often using cloud storage services like Dropbox to do this. In many cases, Dyranges may be installed by another Trojan directly. For example, Dyranges may be installed by Upatre, a threatening Trojan downloader used to deliver threats onto victims' computers.

How Dyranges Carries out Its Attack

Dyranges uses a modular build in order to add a wide number of features and functionalities to its attack. Dyranges infections may vary depending on the specific modules contained in that specific version of Dyranges. Dyranges has added encryption to the most recent versions of this threat through the use of a specific module designed to do this. Although Dyranges may be adapted for a variety of attacks, the modules most commonly used are those that allow Dyranges to function as a banking Trojan. Dyranges can intercept online banking data and related traffic on the victim's Web browser using function hooking attacks. Dyranges uses a different approach depending on the victim's Web browser, specifically designed to attack the three most popular Web browsers on Windows: Internet Explorer, Mozilla Firefox and Google Chrome.

Over time, Dyranges has been used to target nearly three hundred different banking institutions in order to collect money from their customers. Dyranges may be installed automatically. Once Dyranges enters the infected computer, Dyranges collects usernames and passwords as the victim enters this information into the banks' websites. Dyranges may hide itself behind fake Google Update Services, as well.

Dealing with Dyranges and Similar Banking Trojans

One of the main problems involving Dyranges is the fact that its modular capabilities make Dyranges so variable. Dyranges is also capable of hiding itself quite effectively, making its attack more threatening because banking Trojans are at their most effective when victims are not aware of their presence on a computer. If you have been exposed to Dyranges, a strong security program that is fully updated is paramount to remove all traces of this banking Trojan from your computer.

Trending

Most Viewed

Loading...