{
	"id": "88203e11-0bf8-4c25-add6-d020c716444c",
	"created_at": "2026-04-06T00:14:34.823042Z",
	"updated_at": "2026-04-10T03:21:42.512686Z",
	"deleted_at": null,
	"sha1_hash": "6de1d7e8101b23794ef8d558dddd1ce73c8bf0c0",
	"title": "Dridex Targets MacOS Using New Entry Method",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 31331,
	"plain_text": "Dridex Targets MacOS Using New Entry Method\r\nBy By: Trend Micro January 10, 2023 Read time: Less than a minute (125 words)\r\nArchived: 2026-04-05 16:59:20 UTC\r\nArticle title: ‘Dridex Returns, Targets MacOS Using New Entry Method\r\nAuthor: Armado Pedragoza\r\nTrend Micro Research has unpublished the article titled ‘Dridex Returns, Targets MacOS Using New Entry\r\nMethod, authored by Armando Pedragoza.\r\nOriginally, this post claimed that Dridex had returned. However, further research and analysis has led us to believe\r\nthat the initial conclusion was incorrect. There are currently no active campaigns that use the tactics and\r\ntechniques employed by the macOS malware sample, which has a binary with an old Dridex variant embedded in\r\nit. The malware sample in question has been around since 2019. As of the time of writing, we have not seen this\r\nsample being used in the wild. Thus, it is not accurate to state that Dridex has returned.\r\nSource: https://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html\r\nhttps://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html\r\nPage 1 of 1",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.trendmicro.com/en_us/research/23/a/-dridex-targets-macos-using-new-entry-method.html"
	],
	"report_names": [
		"-dridex-targets-macos-using-new-entry-method.html"
	],
	"threat_actors": [],
	"ts_created_at": 1775434474,
	"ts_updated_at": 1775791302,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/6de1d7e8101b23794ef8d558dddd1ce73c8bf0c0.pdf",
		"text": "https://archive.orkl.eu/6de1d7e8101b23794ef8d558dddd1ce73c8bf0c0.txt",
		"img": "https://archive.orkl.eu/6de1d7e8101b23794ef8d558dddd1ce73c8bf0c0.jpg"
	}
}