Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Grandoreiro Banking Trojan Resurfaces

May 20, 2024
Reading Time: 3 mins read
in Alerts
Grandoreiro Banking Trojan Resurfaces

The Grandoreiro banking trojan has re-emerged in a global phishing campaign starting March 2024, following a law enforcement takedown in January. This campaign targets over 1,500 banks across more than 60 countries, including regions in Central and South America, Africa, Europe, and the Indo-Pacific. It is believed that the attacks are facilitated through a malware-as-a-service (MaaS) model, indicating a collaboration with other cybercriminals.

Despite Grandoreiro’s initial focus on Latin America, Spain, and Portugal, the current campaign represents a strategic shift, likely due to previous efforts by Brazilian authorities to dismantle its infrastructure. Alongside the expanded targeting, the malware itself has undergone significant updates. These improvements include advancements in string decryption, the domain generating algorithm (DGA), and the ability to exploit Microsoft Outlook clients on infected systems to propagate further phishing attacks.

The phishing attacks start with emails instructing recipients to click a link to view an invoice or make a payment, depending on the impersonated government entity. Clicking the link leads to a fake PDF icon, which downloads a ZIP archive containing the Grandoreiro loader executable. This custom loader, designed to evade anti-malware scans, checks if the host system is in a sandboxed environment, gathers victim data for a command-and-control (C2) server, and downloads the main banking trojan.

Once executed, the trojan establishes persistence via the Windows Registry and uses a reworked DGA to connect with a C2 server for further instructions. Grandoreiro supports various commands for remote system control, file operations, and special modes, including a new module for collecting Microsoft Outlook data and using the victim’s email account to send spam. By leveraging the local Outlook client, Grandoreiro can spread through infected inboxes, significantly increasing spam volume.

Reference:
  • Grandoreiro Banking Trojan Returns with Global Phishing Attack

Tags: AfricabankingBrazilCyber AlertCyber Alerts 2024Cyber RiskCyber threatEuropeGrandoreiro banking trojanIndo-PacificLatin AmericaMaaSMay 2024PhishingPortugalSouth AmericaSpainTrojan
ADVERTISEMENT

Related Posts

Fake DocuSign Alerts Target Corporate Logins

Fake DocuSign Alerts Target Corporate Logins

May 28, 2025
Fake DocuSign Alerts Target Corporate Logins

Fake Bitdefender Site Spreads Venom Malware

May 28, 2025
Fake DocuSign Alerts Target Corporate Logins

Microsoft Void Blizzard Cyber Threat Alert

May 28, 2025
GhostSpy Android Malware Full Device Control

FBI Warns Luna Moth Targets US Law Firms

May 27, 2025
GhostSpy Android Malware Full Device Control

Winos 4.0 Malware Spread Via Fake Installers

May 27, 2025
GhostSpy Android Malware Full Device Control

GhostSpy Android Malware Full Device Control

May 27, 2025

Latest Alerts

Microsoft Void Blizzard Cyber Threat Alert

Fake DocuSign Alerts Target Corporate Logins

Fake Bitdefender Site Spreads Venom Malware

FBI Warns Luna Moth Targets US Law Firms

Winos 4.0 Malware Spread Via Fake Installers

GhostSpy Android Malware Full Device Control

Subscribe to our newsletter

    Latest Incidents

    Migos IG Hack Blackmails Solana Cofounder

    Tiffany & Co. Faces Data Breach Incident

    MathWorks Crippled by Ransomware Attack

    Everest Ransomware Leaks Coke Staff Data

    Adidas Data Breach Exposes Customer Contacts

    Semiconductor Firm AXT Hit by Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial