ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dyre Wolf Malware Bleeds Businesses of $1.5 Million Per Hack

b2ap3_thumbnail_dyre_wolf_phishing_400.jpgWith spring arriving, “winter is coming” as the new season of the critically-acclaimed television series Game of Thrones returns to millions of viewers worldwide. Ironically, there’s also a type of malware gaining traction in the online community that matches its bark with its bite, aptly dubbed Dyre Wolf. This threat has the potential to cost businesses as much as $1.5 million per hack, and takes advantage of the ever-common spear phishing tactic.

The threat, which was discovered last October by John Kuhn of IBM, reports that Dyre Wolf follows the recent trend in which hackers turn to sophisticated social engineering attacks to get what they want. ZDNet reports that this threat uses the Dyre banking trojan to infiltrate IT infrastructures and steal immense amounts of cash.

To keep your business from arriving at the same fate as Ned Stark from Game of Thrones (and Sean Bean’s characters in general), you need to understand just how dangerous Dyre Wolf really is. Just like a bite from Ghost the Dire Wolf, this malware can leave your business crippled, if not finished completely.

Normally, trojans only go after individual bank accounts held by unsuspecting individuals; however, Dyre Wolf targets the accounts of big business to leave them hurting. This is why it’s always best to make sure your team knows how to identify and avoid social engineering threats that take advantage of coercion of the human mind. To accomplish this goal, Dyre Wolf uses a seven step process:

dyre wolf

  • Step 1: Spear Phishing Attacks. The employee will receive a phony email that houses the Upatre malware. This malware is designed to download the Dyre Trojan.
  • Step 2: Execution. The Upatre malware installs itself on the computer when opening an infected attachment.
  • Step 3: Communication. Upatre downloads Dyre onto the infected system.
  • Step 4: Watching and Waiting. Dyre observes the browsing behavior of the infected PC, waiting for the victim to visit one of several hundred banking websites. It then displays a message claiming that there’s an issue with the account, along with a fake support phone number.
  • Step 5: The Fake Phone Call. The user calls the fake number and is greeted by a human voice, rather than an automated one. The hacker then proceeds to gather sensitive information and credentials, unbeknownst to the user.
  • Step 6: The Wire Transfer. The criminal arranges for the money transfer using the stolen credentials.
  • Step 7: DDoS. While the money is being transferred, the targeted organization will experience a distributed denial of service attack. The concept behind this is that the victim’s institution will be too busy dealing with the downtime to realize that they’ve been robbed.

Knowing how the threat executes its attack is the first step to protecting your business, but the heart of this problem (and of any phishing attack) lies in how your team responds to the potential threat. Social engineering takes advantage of people not knowing how to identify scams. Therefore, the best thing you can teach your team is how to identify and prevent phishing attacks before it’s too late.

IBM suggests the following steps be taken to make sure your team is as prepared as possible to deal with phishing scams:

  • Make sure that employees understand security best practices, and how to report suspicious behavior.
  • Perform practice mock exercises to get a feel for how well your employees identify sketchy attachments and email messages. These would be designed to simulate real criminal behavior, and as such, should be an effective means for helping you gather information.
  • Offer advanced security training that helps employees understand why they must be on the lookout for suspicious online behavior, and what they can do about it should they encounter it.
  • Train employees on how to respond to banking threats, and make sure they know that banks will never request sensitive information that could compromise your account.

For more best practices on how to optimize security, give ClearView IT a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Windows 10 Apps IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Remote Work Managed Service Provider Government Saving Money Operating System Artificial Intelligence Gadgets Managed IT services Workplace Strategy Networking Windows Spam Business Technology Bandwidth Blockchain Remote Encryption Mobile Device Management Server App WiFi Information Virtualization Office 365 History Budget Employee/Employer Relationship Gmail Office Apple Two-factor Authentication Information Technology BDR Health Cybercrime Wi-Fi Conferencing Analytics Access Control Big Data Data Security Remote Monitoring Document Management Hacker Save Money Employer-Employee Relationship IT Management Training Compliance Remote Computing Help Desk Hacking Cost Management Voice over Internet Protocol Patch Management Vendor Legal Project Management Vulnerabilities Data storage Money Search... Customer Service Best Practice Unified Threat Management Firewall Retail Data loss Augmented Reality Alert Word BYOD IBM Hiring/Firing Website Computing Outlook Vendor Management Password Hard Drive Mobile Office Applications Managed Services Printer Mobile Computing How To Monitoring Marketing Healthcare Running Cable Websites Mobility Meetings Sports Travel Social SaaS DDoS Virtual Reality Storage Social Engineering Google Maps Cryptocurrency Scam Black Market iPhone Cleaning Education Cortana Robot Content Filtering VPN User Update Windows 11 Router Chrome The Internet of Things Data Breach YouTube Remote Workers Twitter Paperless Office Antivirus Windows 7 Maintenance Free Resource Law Enforcement End of Support Laptop Presentation Specifications Current Events IT Consultant Downtime Multi-factor Authentication Hack Start Menu Safety Identity Theft Solutions Downloads Notifications Computer Care Unified Communications Customer Relationship Management Vulnerability Saving Time Co-Managed IT Images 101 Virtual Desktop Integration Google Docs Entertainment Experience Display Bluetooth Software as a Service Distributed Denial of Service Data Protection Computers Bitcoin Office Tips Private Cloud Memory Telephone Employees Avoiding Downtime Disaster Holidays Excel Politics Machine Learning Settings Cooperation Lithium-ion battery HIPAA Tech Terms Video Conferencing Solid State Drive Virtual Machines Managed IT Digital Computer Repair Processors Virtual Assistant Professional Services Chromebook Taxes Drones Automobile Processor Managed Services Provider How To PowerPoint Virtual Private Network Wireless Technology Microchip Physical Security Administration eWaste Flexibility Smartwatch In Internet of Things Legislation Communitications News Microsoft 365 Cables intranet User Tip Printing Evernote Network Management Procurement Wireless Hacks CCTV Shortcut Network Congestion Heating/Cooling Writing Environment Phone System Touchscreen FinTech Reliable Computing Emergency Proxy Server CES Windows XP Emails IT Assessment Computer Malfunction Fake News Point of Sale Social Networking Vendor Mangement Service Level Agreement Supply Chain Management Computing Infrastructure Value Scalability Samsung Device security Cyber security Shortcuts Management Organization Administrator Uninterrupted Power Supply Wireless Headphones Smart Devices Text Messaging Webcam Microsoft Excel Proactive IT Tech Computer Accessories Business Mangement Going Green Remote Working Bring Your Own Device Business Cards Tablets Trend Micro Be Proactive Error AI Bookmark Digital Security Cameras Electronic Health Records Transportation Music Google Calendar Term Download Staffing Supercomputer Piracy Wasting Time HTML eCommerce IP Address Modem Workplace Strategies Virus Browsers Videos Botnet Nanotechnology Surveillance Motion Sickness Micrsooft Comparison Google Play Google Drive Upload Rental Service Software License Managing Costs Flash SSID Social Network Knowledge Data Analysis Media Corporate Profile Screen Reader Development Telephone Systems Employer/Employee Relationships Business Growth Troubleshooting Competition Television Security Cameras Telephony Trends Recovery Employer Employee Relationship Mobile Technology Virtual Machine Cabling Devices Optimization Smart Technology Customer Resource management Reviews Fileless Malware 2FA LiFi Tablet Banking G Suite Tip of the week Teamwork Entrepreneur Google Wallet Application Deep Learning Mouse VoIP Gamification Data Storage Documents Messenger Tracking Company Culture Hypervisor Regulations Medical IT Business Intelligence Telephone System Shopping Directions Paperless Backup and Disaster Recovery Business Metrics Web Server SQL Server Hosted Solution Business Owner SharePoint Content PCI DSS Securty Books Digital Payment Desktop Licensing Worker Accountants Humor Domains Language Supply Chain Society Electronic Medical Records Gig Economy Business Communications Access Database Internet Service Provider Azure Monitors Visible Light Communication Time Management Regulations Compliance Reading Public Cloud Managed IT Service Equifax Memes Workplace Windows 8 Health IT Audit Human Resources Spyware Tactics Net Neutrality Hard Drive Disposal Inbound Marketing Public Speaking Displays Advertising Username Financial Data Relocation File Sharing Risk Management Streaming Media Startup IT Work/Life Balance Freedom of Information Scams Tech Support Redundancy Navigation Google Apps Cache Addiction email scam Keyboard Hard Drives Electronic Payment Unified Threat Management Telework Workers Mobile Security

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?