Police in eight countries worked with security vendors to seize domain names and servers used by the Trojan program Police from eight countries together with several private security companies disrupted the online infrastructure used by cybercriminals to control computers infected with a malware program called Shylock.Shylock is a Trojan program that first appeared in 2011, primarily targeting online banking. The threat is named after a fictional character in Shakespeare’s “The Merchant of Venice” because it includes fragments from the play in its binary files.Like most malware programs that steal financial information, Shylock is able to inject code into websites in order to capture credentials and trick victims into performing rogue financial transactions. However, the Trojan program has evolved over the years, with its creators adding modules so that it can infect external and USB drives, steal credentials from FTP programs and turn infected computers into proxy servers, among other things. Security vendor Symantec reported in April 2013 that Shylock was targeting customers of over 60 financial institutions, the majority of them from the U.K., and some from Italy and the U.S. The law enforcement operation Tuesday and Wednesday seized servers and domain names used by Shylock-infected computers to communicate with each other and the attackers.The action was led by the U.K.’s National Crime Agency (NCA) and was coordinated from the European Cybercrime Centre (EC3) at Europol. Law enforcement agencies from the U.K., the U.S., the Netherlands, Turkey, Italy, Germany, Poland and France participated. Several IT security vendors, including BAE Systems Applied Intelligence, Dell SecureWorks, Kaspersky Lab and Heimdal Security (part of CSIS Security Group), provided support. Shylock is believed to have infected over 30,000 computers worldwide, the NCA said in an announcement. The Trojan program has targeted the U.K. more than any other country, but the suspected developers are based somewhere else, the agency said.Users typically have their computers infected with Shylock after clicking on malicious links that take them to drive-by download exploits or after inserting infected removable drives into their computers.The NCA and Europol advised users to turn on automatic updates in Windows in order to protect themselves from Shylock. That’s because Tuesday Microsoft added detection and removal routines for the threat, which it calls Win32/Caphaw, to its Malicious Software Removal Tool (MSRT). The tool is distributed through Windows Update, but users can also download it directly from the company’s website. Related content feature Securing your small business against new cybersecurity threats By Dell Technologies Mar 10, 2021 1 min Cyberattacks IT Strategy Cybercrime news analysis Easy way to bypass passcode lock screens on iPhones, iPads running iOS 12 The vulnerability allowing anyone to bypass the passcode lock screen still exists in iOS 12 running on iPhones and iPads that have Touch ID. By Darlene Storm and Michelle Davidson Sep 18, 2018 9 mins Apple Cybercrime Security feature Security budgets of Indian organizations: Where are they heading? The perpetual catch up game between hackers and CISOs is resulting in a steadily rising cybersecurity budget. We take a look at what’s driving this trend and assess the security roadmap in 2018. By Computerworld India staff Jan 31, 2018 3 mins Advanced Persistent Threats Regulation Small and Medium Business feature What India Inc. wants from Union Budget 2018 From preferential tax rates to driving ‘ease of doing business’, here’s what the Indian enterprise and startup ecosystem expect from the Union Budget. By Soumik Ghosh Jan 29, 2018 7 mins Small and Medium Business Startups Telematics Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe