Dreambot Malware Infrastructure Remains Down as Operations Went Silent


  • The Dreambot trojan looks to have abruptly stopped functions, as the infrastructure stays down for weeks now.
  • There have been no new versions in the wild since March, so this could be the stop of Dreambot.
  • It is highly not likely that this will bring any authentic disruptions for malicious actors, as they will merely use other resources.

The CSIS Protection Team is reporting on the finish ceasing of “Dreambot” activities. This botnet has been about about the last 6 a long time and has hardly ever been so silent prior to. The Danish cybersecurity organization thinks that this is the close of operations for the malware, as the onion C&Cs and the again-close servers have been offline for weeks now. That's why, it is not likely that the staff behind the banking trojan is pausing functions to put together a new and upgraded variation. No new Dreambot samples have appeared in the wild since March, so we can suppose that this menace is truly in excess of by now.

Dreambot was the moment a thriving procedure, and throughout 2019 on your own it accounted for more than a million bacterial infections around the globe. Although it begun as a specialized banking trojan, it quickly progressed into a standard-function trojan that was provided for lease to cyber-criminals. It highlighted “infection overview” panels with a friendly interface, and supported a lot of functions in a vast assortment of fields. Dreambot was utilised by a neighborhood of hundreds of actors who undertook unique roles in each and every course of action, performing as very well-organized gangs. From BEC fraud and ransomware infections to POS systems compromise and e-commerce functions, Dreambot supported a large assortment of malicious functions.

Source: Medium

The exact motives driving the termination of Dreambot continue to be unknown for the time currently being, and CSIS can only speculate. In typical, the growth of the botnet was not really “hot” in the final few of decades, and the lack of new characteristics could have pushed malicious actors to appear in other places. Perhaps the rise of Zloader or the appearance of several Gozi variants has played a job, or potentially the COVID-19 could have a thing to do with Dreambot’s sudden demise. We would presume that the “bus factor” of program jobs like Dreambot can not be comfortably large.

So, what occurs from now on, then? Does this indicate that we will get a break from banking trojan attacks? However, not at all. Actors will just flip to other resources, and there is an abundance to opt for from (Trickbot, Emotet). Hoping to see any languor in destructive functions thanks to the termination of Dreambot is like hoping that financial institution robberies will end just simply because a gun maker stopped making revolvers. Robbers will just get a distinct gun brand name and have on raiding economic institutes. The only factor that will prevent them is protective steps and defense mechanisms, and this is all what matters in cybersecurity as perfectly.

Written by David Minister

Composed by ODD Balls

User Review
0 (0 votes)

Be the first to comment

Leave a Reply

Your email address will not be published.