Security researchers at Trend Micro have identified an ongoing and large-scale attack targeting the customers of seven major banks in India. The campaign is notable for its coordinated nature, employing five different families of banking malware. The primary goal of the attackers is to harvest sensitive financial information, including online banking credentials and credit card data. The attacks are initiated through phishing campaigns that lure unsuspecting victims to fraudulent websites. This operation signifies a substantial and active threat to the Indian financial ecosystem and its customers.
This campaign, while not technically novel, is dangerous due to its scale and coordination.
Train users to identify and report phishing emails, and to never enter credentials on a site they reached via an unsolicited link.
Use DNS filtering and web gateways to block access to known and suspected phishing domains.
Enforce MFA on all banking applications to provide an additional layer of security against stolen credentials.
To combat large-scale phishing campaigns like the one targeting Indian banks, enterprises and individuals should use DNS filtering services that maintain a denylist of malicious domains. When a user clicks a phishing link, the DNS request to the fraudulent domain (e.g., 'bankofindia-login.com') is intercepted by the filtering service. The service checks the domain against its real-time threat intelligence feeds, identifies it as malicious, and blocks the connection. The user is then redirected to a safe block page, preventing them from ever reaching the credential harvesting site. This is a highly effective, automated defense that protects users even if they are tricked into clicking the initial link, breaking the attack chain before sensitive data can be entered.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.