<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><div><img src="https://info.threatstop.com/hubfs/DiamondFox.jpg" alt="DiamondFox"></div> <p>DiamondFox, also known as Gorynych, is a modular malware that highlights the growth of the malware-as-a-service industry. With accessible how-to videos on YouTube showing aspiring cybercriminals how to set up DiamondFox and a <a href="https://blog.malwarebytes.com/threat-analysis/2017/04/diamond-fox-p2/">user-friendly interface</a>, it’s easy to see how this malware allows even the least sophisticated attacker to potentially compromise victims.<!--more--></p> <p>Written in Visual Basic, DiamondFox has been present on the black market for several years. It was notably used in <a href="http://documents.trendmicro.com/assets/Operation_Black%20Atlas_Technical_Brief.pdf">Operation Black Atlas</a> to steal user credentials and credit card information from PoS systems.</p> <p>DiamondFox is highly customizable and includes features like user-friendly management panels that allow cybercriminals to easily see live infection statistics for their victims.</p> <p>Various plugins for the DiamondFox malware allow <a href="http://blog.checkpoint.com/wp-content/uploads/2017/05/DiamondFox_Report_170510-2.pdf">different capabilities</a>, such as the ability to launch DDoS attacks, steal a victim’s credentials and cryptocurrency wallets, and propagate through removable devices and social networks. The wide variety of available features in the malware allow it to be easily modified for different purposes based on the cybercriminal’s needs.</p> <p>Enabling TSCritical targets in policies for ThreatSTOP DNS Firewall Service and IP Firewall Service, protects against exploit kits like the Terror EK.If you do not have a ThreatSTOP account,&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to a <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+DNS+Firewall#ThreatSTOPDNSFirewall-DNSFWPolicy">DNS</a> or <a href="http://dochub.threatstop.com/display/TS/ThreatSTOP+IP+Firewall">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub. Or contact our&nbsp; team.</p></span>