
Massive Brute Force Attack Targeting Networking Devices
A large-scale brute force attack is underway, using nearly 2.8 million IP addresses daily to target networking devices from Palo Alto Networks, Ivanti, and SonicWall….
The Grandoreiro banking trojan, a notorious malware primarily targeting banks, has resurfaced in a global campaign since March 2024. After a temporary disruption by law enforcement in January, this sophisticated malware has returned, impacting over 1500 banks across 60 countries.
Initially confined to Latin America, Spain, and Portugal, Grandoreiro has expanded its reach significantly. The latest campaign targets entities in Central and South America, Africa, Europe, and the Indo-Pacific. The operators behind Grandoreiro utilise a Malware-as-a-Service (MaaS) model, which has contributed to its widespread distribution.
The resurgence of the Grandoreiro banking trojan highlights the persistent threat posed by advanced malware. By understanding its TTPs and implementing robust preventive measures, businesses and individuals can significantly reduce the risk of infection and mitigate the impact of potential breaches.
For further information and detailed technical analysis, refer to resources provided by cyber security experts and organisations tracking this threat. Further information available at: