DanaBot Banking Trojan
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
Affected platforms
The following platforms are known to be affected:
Threat details
DanaBot is distributed using malicious RAR and ZIP files delivered via spam campaigns. The files contain a combination of VBS and PowerShell scripts, collectively referred to as Brushaloader, that acts as a dropper for the final payload.
Once installed on an affected device, DanaBot will install four modules:
- VNC - used to allow the attacker to connect to and control the device.
- Sniffer - performs script injection on banking sites visited by the user.
- Stealer - collects user credentials from browsers, chat and email clients, FTP and VPN applications and online poker applications.
- TOR - installs a Tor proxy for communication with a command and control server.
Newer versions will also include an RDP module to provide a second means of control if the VNC module is unable to connect.
Remediation steps
| Type | Step |
|---|---|
|
If Remote Desktop Protocol (RDP) is not used, then ensure port 3389 (TCP/UDP) is blocked at your internet firewall. If RDP is used, then:
Additionally, to prevent and detect a trojan infection, ensure that:
|
Last edited: 17 February 2020 12:41 pm