Categories: CryptoNews

Cerber Bitcoin Ransomware Creators Use Dridex Spam Provider

The topic of Bitcoin ransomware has been touched upon multiple times over the past few months, but it appears as if Cerber ransomware attacks are on the rise once again. By sending spam email messages through the same infrastructure used by Dridex banking malware, it looks like this threat is far from over.

Cerber Ransomware Threat Looms Overhead

What sets Cerber ransomware apart from other offerings is how the software package uses text-to-speech when “talking” about the ransom note to infected victims. Even though this threat showed up not too long ago, it looks like a new wave of attacks is imminent. Consumers and enterprises are advised to take the necessary precautions.

It appears as if the people behind Cerber have partnered with the same spam distributor used to spread the Dridex banking malware throughout the world. This indicates Cerber is on the cusp of becoming a major globals threat in the coming months, and it could take on a scale of infection similar to what we have seen with Locky.

Dridex malware has been making a name for itself as well, as the code is designed to obtain sensitive financial credentials. The majority of these malware attacks stem forth from massive spam campaigns targeted financial corporations, with several millions of messages crossing the World Wide Web on a daily basis. Now that Cerber seems to be following the same path, it is impossible to tell what the consequences may be.

Related Post

Spreading through malicious email attachments – disguised as an invoice – is nothing new in the cyber security world, yet it is still one of the most effective ways to infect as many computers as possible. One a computer has been infected; the tool detects if an Internet connection is present to download the ransomware itself.

Businesses and consumers need to ensure they have a backup of their sensitive data at all times, as that is the only way to prevent [major] data loss. But there is even more cause for concern now that Cerber seems to be install spambot modules on infected computers as well. Getting rid of this nasty software should be the primary goal for everyone dealing with this code at some point.

Source: Threatpost

Images credit 1,2

If you liked this article follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin and altcoin price analysis and the latest cryptocurrency news.

JP Buntinx

JP Buntinx is a FinTech and Bitcoin enthusiast living in Belgium. His passion for finance and technology made him one of the world's leading freelance Bitcoin writers, and he aims to achieve the same level of respect in the FinTech sector.

Share
Published by
JP Buntinx

Recent Posts

Ethereum Names Its Post-Glamsterdam 2026 Upgrade: Hegota

Ethereum developers have officially named the network’s post-Glamsterdam 2026 upgrade Hegota. The name merges two…

21 hours ago

TRON Integrates With Kalshi, Bringing TRX and USDT to the World’s Largest Prediction Market

TRON is pushing deeper into real-world financial infrastructure. TRON has announced that Kalshi, the world’s…

21 hours ago

Former Pump.fun Developer Sentenced to Six Years After $2M SOL Heist

The “crypto Robin Hood” story has reached its legal end. A London court has sentenced…

21 hours ago

NEAR Goes Live on Solana as Cross-Chain Trading and AI Ambitions Accelerate

$NEAR is now live on Solana. And the implications go far beyond a simple token…

2 days ago

Bitcoin Rips to $90K, Then Slips as Leverage and Supply Collide

Bitcoin moved fast. Then it pulled back just as quickly. A sudden surge pushed BTC…

2 days ago

Hyperliquid Proposes 37M HYPE Burn as Validators Prepare to Vote

Hyperliquid is facing one of its most consequential governance moments yet. A proposal now before…

2 days ago