Malware
The Symantec has the services of advanced threat security that uncovers the threats across the endpoint devices, networks and emails by using the Dridex variant that works as a strain in banking malware that covers through macros in Microsoft Office to infect systems (Ramos,2016). Dridex enters the user’s computer like a spam email that contains a Microsoft word document that contains the attached message. Once the user opens the document, there is a macro that is embedded in that document immediately facilitates downloading of Dridex banking malware When the computer has been affected by the Dridex, they can steal banking credentials and personal information from the system so that it can gain access to your financial records like a user (Vijayalakshmi, at el 2017).
Dridex variant as it works with McAfee is different from the Symantec vender. In McAfee, the Dridex copies itself as an administrator data folder while using the edge with random numbers. Once it has generated the numeric numbers, the variant takes the details of the owner of the computer. Once it has gained access, it is able to alter the information that is available and use it as per the user’s needs (Black at el 2016). The variant is the same, but the way it generates itself is different in the two vendors, but the end function of taking banking information of people is the same from both venders. The replication of the information can be protected using the anti-malware that is specified by the vendor.
Reference
Black, P., & Opacki, J. (2016, October). Anti-analysis trends in banking malware. In 2016 11th International Conference on Malicious and Unwanted Software (MALWARE) (pp. 1-7). IEEE. Retrieved from: https://ieeexplore.ieee.org/abstract/document/7888738/
Ramos, E. (2016). Dridex-an old dog is learning new tricks. Retrieved from: https://www.gdatasoftware.com/blog/2016/10/29261-dridex-an-old-dog-is-learning-new-tricks
Vijayalakshmi, Y., Natarajan, N., Manimegalai, P., & Babu, S. S. (2017). Study on Emerging Trends in Malware Variants. International Journal of Pure and Applied Mathematics, 116(22), 479-489.Retrieved from: https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/bartos