Avast researchers reported that the infamous Ursnif Trojan was employed in attacks against at least 100 banks in Italy.
Avast experts recently obtained information on possible victims of Ursnif malware that confirms the interest of malware operators in targeting Italian banks.
Operators behind this attacks have stolen financial data and credential from targeted financial institutions.
“Among the countries Ursnif has significantly impacted is Italy, a fact that we found reflected in the information our researchers obtained.” reads the analysis published by Avast. “Specifically we found usernames, passwords, credit card, banking and payment information that appears to have been stolen from Ursnif victims by the malware operators. We saw evidence of over 100 Italian banks targeted in the information we obtained. We also saw over 1,700 stolen credentials for a single payment processor.”
According to data obtained by Avast, at least 100 Italian banks have been targeted with the Ursnif Trojan and in one case, crooks stolen over 1,700 sets of credentials from an unnamed payment processor.
Ursnif is one of the most and widespread common threats today delivered through malspam campaigns. It appeared on the threat landscape about 13 years ago and gained its popularity since 2014 when its source code was leaked online giving the opportunity to several threat actors to develop their own version.
Avast researchers shared their findings with the impacted payment processors and banks and Italian authorities and financial CERTs, including CERTFin.
“With this information these companies and institutions are taking steps to protect their customers and help them recover from the impact of Ursnif.” concludes AVAST.
If you want to receive the weekly Security Affairs Newsletter for free subscribe here.
Follow me on Twitter: @securityaffairs and Facebook
(SecurityAffairs – hacking, Ursnif)
The post The Ursnif Trojan has hit over 100 Italian banks appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.