"Dyre Wolf" targets businesses that use wire transfers to move large sums of money, even when the transactions are protected with two-factor authentication. The heist starts with mass e-mailings that attempt to trick people into installing Dyre, a strain of malware that largely remains undetected by the majority of antivirus products.
Infected machines then send out mass e-mails to other people in the victim's address book. Then the malware lies in wait. Once the infected victim tries to log in to one of the hundreds of financial institution websites for which Dyre is programmed to monitor, a new screen will appear instead of the corporate banking site. The page will explain the site is experiencing issues and that the victim should call the number provided to get help logging in.
The attackers are bold enough to use the same phone number for each website and know when victims will call and how to answer for each financial institution. This all results in successfully duping their victims into providing their organizations’ banking credentials.
As soon as the victim hangs up the phone, the wire transfer is complete. The money starts its journey and bounces from foreign bank to foreign bank to circumvent detection by the financial institution and law enforcement.
TRC Interactive’s First Line of Defense™ program offers interactive and engaging fraud training to help financial institutions identify and prevent fraud attempts. To learn more, visit http://trcinteractive.com/training-solutions/fraud-training.asp or contact us at either email@example.com or (800) 222-9909.