WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Combination of Banking Trojans and Ransomware Bound to Worsen
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Combination of Banking Trojans and Ransomware Bound to Worsen

Author: Charles Egli

Created: Thursday, February 20, 2020 - 15:46

Categories: Cybersecurity

IBM’s Security Intelligence has published an article discussing the evolution of banking Trojans, which began a little over a decade ago with the Zeus commercial banking Trojan and have become increasingly sophisticated both in terms of their code and the organized gangs who wield them. While threat actors once primarily used banking Trojans to steal money from corporate accounts, today they are increasingly using them to conduct targeted ransomware attacks that can entail exorbitant payment demands. In its discussion, the article poses an often-overlooked question: “Why are attackers using so many stages to infect users instead of a direct hit with ransomware?” As the article explains, “They are doing this to have better control of the attack, to evade controls and detection, and to be able to plant the seeds of a ransomware operation that encompasses enough devices to entice victims to pay.” And this approach has paid off, as the article notes, with the threat actors behind the Ryuk ransomware (which has been paired with the Emotet and TrickBot banking Trojans, among others) amassing over $3.7 million in the span of five months. Given that operations combining banking Trojans and ransomware have proven so successful and lucrative, the article concludes they are likely to continue and even increase. To combat this threat, it recommends organizations should stay up to date with the rapidly evolving threat landscape by utilizing the latest threat intelligence. It also encourages companies to ensure the security of users’ identities on company networks and across the internet. Read the article at IBM Security Intelligence.

Related Resources

(TLP:CLEAR) Non-Human Identities (NHIs) Are Growing Faster Than Most Security Programs

May 14, 2026 in Cybersecurity, Security Preparedness

(TLP:CLEAR) CISA and Partners Release Joint Guidance: Software Bill of Materials for AI – Minimum Elements

May 14, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER) FBI FLASH Report – Scattered Lapsus$ ShinyHunters Actors Conducting Data Theft and Extortion Campaigns

May 14, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar