The IceID banking Trojan has been updated with additional evasion techniques, including a password-protected attachment, keyword obfuscation and Dynamic Link Library file that acts as a second-stage downloader, according to Juniper Threat Labs. The threat actors behind the campaign, first spotted in July, research their target before an attack to identify a handful of customer names, Juniper’s new report states. Using a known name helps the hackers to entice the victim to open a phishing email that contains the Trojan.”]
Source: https://www.cuinfosecurity.com/icedid-malware-revamped-avoidance-capabilities-a-14833