<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><p>The Panda Banker banking Trojan, recently <a href="http://www.securityweek.com/new-panda-banker-trojan-borrows-code-zeus">uncovered</a> by Fox IT, is related to one of the most famous and destructive banking Trojans in history, <strong>Zeus</strong>. The Panda Banker is designed to collect victim's login information and online banking credentials and is currently being used to target banking customers in the United Kingdom and Australia. Like its predecessor, the Panda Banker integrates more advanced persistence, infection strategies and modules, which makes the Panda Banker a considerable threat to its victims.</p> <!--more--><p>After The ThreatSTOP security team manually investigated the associated malicious domain&nbsp;addresses based on an initial report by <a href="https://www.proofpoint.com/us/threat-insight/post/panda-banker-new-banking-trojan-hits-the-market">Proofpoint</a>, our analysis further discovered 35 infected IP addresses, while the original report only mentioned three domains. This IP address was also found to have been associated with over 20 domains beginning in April and continuing until May 1<sup>st</sup>, many of which had already been designated as threats.</p> <p>Threat STOP customers are protected against the Panda Banker Trojan</p></span>