This old trojan learns new tricks in its latest banking info and password-stealing campaign

An infamous form of banking trojan malware with a history going back over a decade has been updated with additional infection techniques as part of a new campaign targeting financial data and passwords.

Ursnif is one of the most popular families of Windows banking trojans deployed by cyber criminals and the code behind it has been active in one form or another since at least 2007 when it first emerged in the Gozi banking trojan.

Gozi’s source code was leaked in 2010, leading to several different versions of the malware emerging and targeting banks. Arguably the most successful versions of malware using Gozi’s source-code, Ursnif is still being actively developed and deployed 12 years on from when the threat first appeared.

Read more…
Source: ZDNet