October 12, 2015 By Ori Bach < 1 min read

“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat.” – Sun Tzu, “The Art of War”

The immortal words of Chinese military philosopher Sun Tzu were written in an age of sword and steel, but they hold true for modern cyber warfare. As security professionals combat various threats, they must look not only at the tactical abilities of malware deployed against them, but also at the strategy of the cyber opponent operating the malware.

While tactics such as the malware’s ability to steal sensitive information and avoid detection are fairly easy to observe through technical analysis, understanding an opponent’s strategy requires deeper intelligence and analysis.

Learn more about Staying ahead of threats with global threat intelligence

The fraudsters behind the Dyre malware offer a great example of a cyber opponent combining superior tactics with superb strategy. While much has been written about the technical abilities of the Dyre Trojan in order to truly assess the nature of the threat, banks must also understand the Dyre fraudsters’ strategy of going after high-value targets and constantly penetrating new geographies, all while remaining stealthy.

This infographic demonstrates how the fraudsters’ tactics — and the Dyre Trojan — have evolved to serve its strategy.

 

 

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today