Security researchers at Trend Micro have identified an ongoing and large-scale attack targeting the customers of seven major banks in India. The campaign is notable for its coordinated nature, employing five different families of banking malware. The primary goal of the attackers is to harvest sensitive financial information, including online banking credentials and credit card data. The attacks are initiated through phishing campaigns that lure unsuspecting victims to fraudulent websites. This operation signifies a substantial and active threat to the Indian financial ecosystem and its customers.
This campaign, while not technically novel, is dangerous due to its scale and coordination.
| Tactic | Technique ID | Name | Description |
|---|---|---|---|
| Initial Access | T1566.002 |
Spearphishing Link | The campaign uses malicious links in messages to lure victims. |
| Credential Access | T1598.003 |
Phishing for Information | The core of the attack is harvesting credentials from fake login pages. |
| Execution | T1204.002 |
Malicious File | The banking malware is likely executed after the user is tricked into downloading it. |
Train users to identify and report phishing emails, and to never enter credentials on a site they reached via an unsolicited link.
Use DNS filtering and web gateways to block access to known and suspected phishing domains.
Enforce MFA on all banking applications to provide an additional layer of security against stolen credentials.
To combat large-scale phishing campaigns like the one targeting Indian banks, enterprises and individuals should use DNS filtering services that maintain a denylist of malicious domains. When a user clicks a phishing link, the DNS request to the fraudulent domain (e.g., 'bankofindia-login.com') is intercepted by the filtering service. The service checks the domain against its real-time threat intelligence feeds, identifies it as malicious, and blocks the connection. The user is then redirected to a safe block page, preventing them from ever reaching the credential harvesting site. This is a highly effective, automated defense that protects users even if they are tricked into clicking the initial link, breaking the attack chain before sensitive data can be entered.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats