Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0386

Ursnif

Type

Banking Trojan

Associated threat actors

TA551 (related to the Shathak group)

Key Capabilities

Steals sensitive financial information, including banking credentials and credit card details, using keystroke logging and web injection.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is Ursnif?

Ursnif (S0386), a variant of the Gozi malware, is a prevalent banking trojan used for financial fraud. It typically spreads through phishing emails and operates stealthily to avoid detection.

A key feature of Ursnif is its use of web injection, where it alters legitimate banking sites to trick users into entering sensitive data. As a keylogger, it also captures credentials and can download other malware, making it a persistent threat.

How to Defend Against Ursnif?

Defending against Ursnif requires blocking its initial delivery and detecting its specific web-based attack methods.

  • Be cautious with email attachments and links, as phishing is the primary delivery vector for this trojan.
  • Keep all systems and software patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy endpoint detection and antivirus software to identify and block the Trojan’s execution and its web injection techniques.
  • Use network detection (NDR) with integrated threat intelligence to spot and block C2 communications associated with Ursnif.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.