The resurgence of Grandoreiro banking malware in the realm of cybercrime is causing concern among individuals and financial institutions. This sophisticated malware, known for its ability to steal sensitive information and financial data, has once again emerged as a significant threat. In this article, we will delve into the comeback of Grandoreiro, its targeting methods, and the necessary precautions individuals and organizations can take to safeguard themselves from this malicious threat.
Grandoreiro, a banking trojan, has resurfaced in a large-scale phishing campaign spanning over 60 countries, targeting customer accounts from approximately 1,500 banks. In January 2024, an international law enforcement operation involving Brazil, Spain, Interpol, ESET, and Caixa Monetary Institution disrupted the malware operation that had been active in Spanish-speaking countries since 2017, resulting in losses of $120 million. Despite this crackdown, Grandoreiro has reemerged on a large scale since March 2024, now targeting English-speaking countries as well.
The malware has undergone technical enhancements, suggesting that its creators evaded arrest and continued their operations. Phishing campaigns utilizing Grandoreiro vary based on the cybercriminals renting the malware, with tailored lures aimed at specific organizations. These phishing emails impersonate government entities in countries like Mexico, Argentina, and South Africa, enticing recipients to click on links for various official documents like invoices or tax statements.
Upon clicking these emails, recipients are directed to download a ZIP file containing a large executable file, which serves as the Grandoreiro loader. The latest variant of Grandoreiro features several new elements and updates, enhancing its evasiveness and effectiveness. These include improved string decryption algorithms, updates on the domain generation algorithm (DGA) for communication with operator tasks, a mechanism targeting Microsoft Outlook clients for phishing activities, and a persistence mechanism using registry Escape keys.
Furthermore, the malware now targets a wider range of financial applications, including cryptocurrency wallets, and offers expanded capabilities such as remote control, file upload/download, keylogging, and browser manipulation through JavaScript commands. Grandoreiro can also gather detailed victim profiling to determine its next steps, allowing operators to have better control over their targets.
Despite previous law enforcement efforts, Grandoreiro remains active and resilient. It avoids execution in specific countries and on certain operating systems, indicating its adaptability and persistence in the face of crackdowns. The continued evolution and sophistication of Grandoreiro underscore the ongoing challenges posed by banking malware in the realm of cybersecurity.