Cybersecurity News in Asia

RECENT STORIES:

SEGA moves faster with flow-based network monitoring
Backups are essential, but they are not a cybersecurity strategy on th...
How the UAE proactively protects its digital economy
Experts urge action on May 2025 Patch Tuesday zero-days, highlight leg...
Haute couture, faible sécurité: luxury retailer’s data leak leaves cus...
Admitad Launches OEM Advertising Division to Drive Mobile Growth throu...
LOGIN REGISTER
CybersecAsia
  • Conference 2025
  • Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning

Select Page

LOGIN REGISTER
  • Conference 2025
  • Features
    • Featured

      How the UAE proactively protects its digital economy

      How the UAE proactively protects its digital economy

      Monday, May 19, 2025, 2:16 PM Asia/Singapore | Features
    • Featured

      Navigating blockchain adoption amid rising security challenges

      Navigating blockchain adoption amid rising security challenges

      Wednesday, May 14, 2025, 12:32 PM Asia/Singapore | Features
    • Featured

      Backups are not enough for cyber resilience

      Backups are not enough for cyber resilience

      Monday, May 5, 2025, 4:49 PM Asia/Singapore | Features
  • Opinions
  • Tips
  • Whitepapers
  • Awards 2024
  • Directory
  • E-Learning
News

How public-private collaborations brought down a tenacious banking trojan group

By CybersecAsia editors | Thursday, March 21, 2024, 5:14 PM Asia/Singapore

How public-private collaborations brought down a tenacious banking trojan group

Years of international cyber forensic work finally paid off this year for INTERPOL and its collaborators in tracking a Malware-as-a-Service syndicate

Recently, INTERPOL announced the arrest of five administrators behind banking trojan operation active across Spanish-speaking countries since 2017.

The Grandoreiro malware has been used to defraud victims and 900 financial institutions of EUR 3.5m in more than 40 countries in North and Latin America, and Europe.

Originating from Brazil, the threat groups behind Grandoreiro uses spear-phishing emails written in Spanish, Portuguese or English to steal data to use for taking over bank accounts, emptying the funds and sending the monies through a money mule network to launder the illicit proceeds.

As multiple versions of the trojan have been found, more than one organization is probably are involved in the development of Grandoreiro as a Malware-as-a-Service project.

According to Craig Jones, Director of the Cybercrime Unit, INTERPOL, the arrest of some members of the banking trojan operation “vividly underscores the importance of sharing intelligence through INTERPOL, and why we are committed to acting as a bridge between public and private sectors. It also sets the stage for further cooperation in the region.” 

Jones was referring to the collaborations of Brazilian and Spanish national cybercrime investigation teams, along with INTERPOL’s other private partners, in analyzing Grandoreiro malware samples gathered between 2020 and 2022. As a result, by August 2023, analytical reports had exploited clues in the overlaps between the samples that allowed investigators to close in on the organized crime group.

Commented Fabio Assolini, Head, Global Research and Analysis Team (Latin America), Kaspersky, one of the participating partners of the multi-year international cyber forensics effort: “Over time, the attackers regularly improve techniques, striving to stay undetected and active longer. In these circumstances, it is extremely important for financial institutions to stay vigilant while also improving their anti-fraud technologies and threat intelligence data. Greater synergy between private and public partners is also pivotal for combatting against such cybercrimes and ensuring a safer environment for users and organizations worldwide.”

Share:

Previous/C O R R E C T I O N — Sumsub/
NextWhich three categories of data loss risk need you worry about?

Related Posts

B1txor20 exploitation of Log4j a “second wave”: expert

B1txor20 exploitation of Log4j a “second wave”: expert

Friday, March 18, 2022

The cryptominer uses lateral spread techniques to survive software patching

The cryptominer uses lateral spread techniques to survive software patching

Monday, December 6, 2021

Which comes first? AI or data security?

Which comes first? AI or data security?

Thursday, July 15, 2021

The greatest threat to industrial cybersecurity may actually be red tape!

The greatest threat to industrial cybersecurity may actually be red tape!

Tuesday, September 29, 2020

Leave a reply Cancel reply

You must be logged in to post a comment.

Voters-draw/RCA-Sponsors

Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
Slide
previous arrow
next arrow

CybersecAsia Voting Placement

Gamification listing or Participate Now

PARTICIPATE NOW

Vote Now -Placement(Google Ads)

Top-Sidebar-banner

Whitepapers

  • 2024 Insider Threat Report: Trends, Challenges, and Solutions

    2024 Insider Threat Report: Trends, Challenges, and Solutions

    Insider threats continue to be a major cybersecurity risk in 2024. Explore more insights on …Download Whitepaper
  • AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    AI-Powered Cyber Ops: Redefining Cloud Security for 2025

    The future of cybersecurity is a perfect storm: AI-driven attacks, cloud expansion, and the convergence …Download Whitepaper
  • Data Management in the Age of Cloud and AI

    Data Management in the Age of Cloud and AI

    In today’s Asia Pacific business environment, organizations are leaning on hybrid multi-cloud infrastructures and advanced …Download Whitepaper
  • Mitigating Ransomware Risks with GRC Automation

    Mitigating Ransomware Risks with GRC Automation

    In today’s landscape, ransomware attacks pose significant threats to organizations of all sizes, with increasing …Download Whitepaper

Middle-sidebar-banner

Case Studies

  • St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    St Luke’s ElderCare enhances operations and capabilities through a centralized secure, scalable network

    With only a small IT team, the digital transformation has united operations across 30 locations, …Read more
  • Automating border control and security with facial recognition technology

    Automating border control and security with facial recognition technology

    Indonesia Immigration & Seaport Authorities enhances security and speeds up border control queues at Batam …Read more
  • Securing wealth advisory services without unnecessary friction: Endowus

    Securing wealth advisory services without unnecessary friction: Endowus

    The wealth advisory platform demonstrates its non-negotiable commitment to a robust security posture through partnering …Read more
  • LifeTech group sets up next-gen security operations center in Malaysia

    LifeTech group sets up next-gen security operations center in Malaysia

    By partnering with a unified cybersecurity platform, the firm will be offering cost-effective advanced SOC …Read more

Bottom sidebar

  • Our Brands
  • DigiconAsia
  • MartechAsia
  • Home
  • About Us
  • Contact Us
  • Sitemap
  • Privacy & Cookies
  • Terms of Use
  • Advertising & Reprint Policy
  • Media Kit
  • Subscribe
  • Manage Subscriptions
  • Newsletter

Copyright © 2025 CybersecAsia All Rights Reserved.