Cybercrime , Fraud Management & Cybercrime , Governance

Banking Malware Targets Mexico; Will It Spread?

Dmitry Bestuzhev of Kaspersky Lab Describes the Risks
Banking Malware Targets Mexico; Will It Spread?
Dmitry Bestuzhev of Kaspersky Lab

Kaspersky Lab has discovered a new form of malware it calls Dark Tequila that has been targeting users in Mexico and stealing bank credentials and other personal and corporate data. The malware can move laterally through a computer while it's offline, says Dmitry Bestuzhev, head of Kaspersky Lab's global research and analysis team for Latin America.

The malware is designed for infiltration of systems even when networks have limited access to the internet, he explains in an interview with Information Security Media Group. "There are two known infection vectors: email and USB devices," Bestuzhev says.

While the malware apparently has been infecting computers in Mexico for about five years, it could potentially spread to other countries, Bestuzhev warns.

"This malware family is designed to be flexible, so today it's targeting victims in Mexico, but tomorrow, if the threat actors want it, it can also be used in other countries," he notes. "Since the structure is modular, it becomes like a malicious Lego to play with, which is fully operated and controlled by the bad guys."

In this interview (see audio link below photo), Bestuzhev also discusses:

  • What differentiates Dark Tequila from other forms of banking malware;
  • Why the malware had not been detected sooner;
  • Preventive measures that banks should deploy to mitigate the risk.

As head of Kaspersky Lab's global research and analysis team for Latin America, Bestuzhev oversees anti-malware development and investigations in the region. He has more than 19 years of experience in IT security across a wide variety of roles.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.