Beware This New-and-Improved Banking Trojan

June 18, 2023

There’s a whole new type of malware that has been making the rounds as of late. Whether you’re running the latest version of Windows or Mac, their built-in browser defenses are always watching out for threats — but the new IcedID malware has a few new tricks up its sleeve.

This virus is a bit of a nuisance, and here’s what you need to know about it.

What is IcedID?

IcedID is a malware application that gets installed on your computer without permission. Once it is downloaded, it connects to a network of other hacked computers to spread the malware.

Currently, it’s finding exploits in places like Skype and Dropbox. This just goes to show that these file-sharing and video conferencing applications are not encrypted, and therefore not a secure channel to send confidential information! If it overtakes your system, then IcedID would be able to send data, steal PII you type in online, and even hijack your webcam and microphone.

The IcedID is not a new strain of malware. Its first known appearance was reported years ago, the brainchild of a group called C2 Team. This infection targets users of the application icedid.net and tries to steal important financial information that allows them to access your bank funds.

How to Clean Your System

So far security experts, have observed the malware spreading through infected Windows 10 systems. IcedID has been found on many computers, and it even has been found on computers that used to have anti-virus programs like Malwarebytes installed.

The icedid.com browser hijacker virus is one of the worst threats out there right now, and it is important that you remove such malware as quickly as possible. A couple of weeks ago, there was an important update to fix the problem; it’s important to set auto-updates so that malware doesn’t continue to cause problems a second longer than it has to. Defer to the advice given by your IT team first before doing anything!

Conclusion

IcedID has been evolving and returning every time security experts find a fix for the latest iteration. Malware always changes, trying to get the better of our latest and greatest technologies. New threats are also popping up all the time, as threat actors invent more effective ways of stealing your personal information and hijacking your applications or devices.

Staying aware of what threats are out there will help you recognize and report them as you encounter suspicious behavior out in the wild. Additionally, remember to set auto-updates whenever possible so that zero-day vulnerabilities are patched as soon as possible — even if you’re not onsite to manually perform an update at that time. You can also set devices to update at a regular time when you’re guaranteed to be off-site, so as not to mess with the flow of operations.

Find what works best for you! Together, people and technology can protect our most precious data from breaches of privacy.

References

Most Recent Post

Guide to Improving Your Company’s Data Management

Guide to Improving Your Company’s Data Management

Data is the lifeblood of modern businesses. It fuels insights, drives decision-making, and ultimately shapes your company's success. But in today's information age, data can quickly become overwhelming.Scattered spreadsheets, siloed databases, and inconsistent...

“Knowledgeable, reliable and trustworthy”

In addition to being knowledgeable, reliable and trustworthy, he’s very friendly and accessible. Would definitely use his services again.

Nyshie Perkinson

Senior Media Specialist, Center for Biological Diversity

Related Articles

Don’t Risk It! Why You Shouldn’t Skip Vulnerability Assessments

Don’t Risk It! Why You Shouldn’t Skip Vulnerability Assessments

Cyber threats are a perpetual reality for business owners. Hackers are constantly innovating. They devise new ways to exploit vulnerabilities in computer systems and networks.For businesses of all sizes, a proactive approach to cybersecurity is essential. One of the...

7 Common Pitfalls When Adopting Zero Trust Security

7 Common Pitfalls When Adopting Zero Trust Security

Zero Trust security is rapidly transforming the cybersecurity landscape. It moves away from traditional perimeter-based security models. In this approach, every connection attempt is continuously verified before granting resource access.56% of global organizations say...

4 Ways Small Businesses Can Leverage Copilot for Microsoft 365

4 Ways Small Businesses Can Leverage Copilot for Microsoft 365

What are some of the key differentiators that can propel small businesses forward? They include efficiency, productivity, and innovation. Microsoft has expanded the availability of one of its most dynamic tools to SMBs. A tool that can be a real game-changer for...