{"id":45119,"date":"2015-08-31T16:52:45","date_gmt":"2015-08-31T23:52:45","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=45119"},"modified":"2025-06-03T22:06:01","modified_gmt":"2025-06-04T05:06:01","slug":"preventing-dridex-infections","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/","title":{"rendered":"Best practices for preventing Dridex infections"},"content":{"rendered":"<p>Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/products.html\">McAfee security products<\/a>. Browse the product guidelines available <a href=\"https:\/\/support.mcafee.com\/\">here<\/a> (click Knowledge Center, and select Product Documentation from the Support Content list) to mitigate the threats based on the behavior described below in the Characteristics and symptoms section.<\/p>\n<p>We build several documentations regarding DRIDEX and variants :<\/p>\n<ol>\n<li><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25689\">https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25689<\/a> \u2013 W97M\/Downloader<\/li>\n<li><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25982\">https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=PD25982<\/a> \u2013 Dridex<\/li>\n<\/ol>\n<p><strong>Basic rules on handling emails:<\/strong><\/p>\n<p>Email from unknown senders should be treated with caution. If an email looks strange, do the following: ignore it, delete it, and never open attachments or click on URLs.<\/p>\n<p>Opening file attachments, especially from unknown senders, harbors risks. Attachments should first be scanned with an antivirus program and, if necessary, deleted without being opened.<\/p>\n<p>Never click links in emails without checking the URL. Many email programs permit the actual target of the link to be seen by hovering the mouse over the visible link without actually clicking on it (called the mouse-over function).<\/p>\n<h2><strong>Configuring Access Protection in <a href=\"https:\/\/www.mcafee.com\/us\/products\/virusscan-enterprise.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">VirusScan Enterprise<\/a><\/strong><\/h2>\n<p><strong>\u00a0<\/strong>Refer to the following KB articles to configure Access Protection rules in <a href=\"https:\/\/www.mcafee.com\/us\/products\/virusscan-enterprise.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">VirusScan Enterprise<\/a>:<\/p>\n<p><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB81095\">How to create a user-defined Access Protection Rule from a VSE 8.x or ePO 5.x console<\/a><\/p>\n<p><a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB54812\">How to use wildcards when creating exclusions in VirusScan Enterprise 8.x<\/a><\/p>\n<p>Dridex usually copies itself into the Administrator\u2019s Application Data folder using edge or edg with the random numeric numbers at the end, like the following examples:<\/p>\n<p><strong>On Win XP:<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>C:Documents and SettingsAdministratorApplication DataLocal Settingsedge or edg[random.hex].exe<\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>WIN7:<\/strong><\/p>\n<p><strong>C:UsersAdministratorAppdatalocaledge or edg[random.hex].exe<\/strong><\/p>\n<p>Users can configure and test Access Protection Rules to restrict the creation of new files and folders when there are no other legitimate uses.<\/p>\n<p>Select <strong>New files being created<\/strong> and add the following file location in <strong>File or folder name to block:<\/strong><\/p>\n<ul>\n<li>[OS installed drive]Documents and Settings[administrator]Application DataLocal Settingsedge or edg[random.hex].exe<\/li>\n<\/ul>\n<p><em>[random. hex] can be replaced with a \u2018*\u2019 thus for example you can either input edge*.tmp or edge123.tmp.<\/em><\/p>\n<h2><strong>Example Access Protection Rules<\/strong><\/h2>\n<p><strong>Windows 7:<\/strong><\/p>\n<p><strong>\u00a0<a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-44626\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\" alt=\"Premier\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier.jpg 721w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/strong><\/p>\n<p><strong>\u00a0<\/strong><strong>Windows XP:<\/strong><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Second.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-44627\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Second-300x298.jpg\" alt=\"Second\" width=\"300\" height=\"298\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-300x298.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Second.jpg 730w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>For the dropped DLL:<\/p>\n<p><strong>WINDOWS XP<\/strong><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Troisieme.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-44628\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Troisieme-300x300.jpg\" alt=\"Troisieme\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Troisieme.jpg 658w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p><strong>Windows 7<\/strong><\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/222.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-45113 size-medium\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/222-300x300.jpg\" alt=\"222\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-300x300.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222-128x128.jpg 128w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/222.jpg 495w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<h2><strong>Configuring <a href=\"https:\/\/www.mcafee.com\/us\/products\/host-ips-for-server.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Host Intrusion Prevention<\/a><\/strong><\/h2>\n<ul>\n<li>To blacklist applications using a <a href=\"https:\/\/www.mcafee.com\/us\/products\/host-ips-for-server.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Host Intrusion Prevention<\/a> (Host IPS) custom signature refer to <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71329\">KB71329<\/a>.<\/li>\n<li>To create an application blocking rules policies to prevent the binary from running refer to <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71794\">KB71794<\/a>.<\/li>\n<li>To create an application blocking rules policies that prevents a specific executable from hooking any other executable refer to <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB71794\">KB71794<\/a>.<\/li>\n<li>To block attacks from a specific IP address through McAfee Nitrosecurity IPS refer to KB74650.<\/li>\n<\/ul>\n<p>*** Disclaimer: Usage of *.* in access protection rules will prevent all types of files from running and being accessed from that specific location. If specifying a process path under \u201cProcesses to Include\u201d, the use of wildcards for Folder Names may lead to unexpected behavior. Users are requested to make this rule as specific as possible.<\/p>\n<p><strong><u>Nouvelles technologies:<\/u><\/strong><\/p>\n<p>You need to know that <a href=\"https:\/\/www.mcafee.com\/us\/products\/threat-intelligence-exchange.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">McAfeeThreat Intelligence Exchange<\/a> in cooperation with \u00e0 Advanced Threat Defense can give you a very efficient protection level against DRIDEX variants. In addition through these technologies you might used IOC or IOA to find other infections sources or patient zero in your network:<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=Wxvizasvj8k&amp;feature=player_embedded\">https:\/\/www.youtube.com\/watch?v=Wxvizasvj8k&amp;feature=player_embedded<\/a><\/p>\n<p>With TIE the rule: \u00a0Malware Dropped by Infected Microsoft Office Documents gives you a way to proactively scan and detect DRIDEX behaviors\u00a0:\u00a0 :\u00a0<a href=\"https:\/\/community.mcafee.com\/docs\/DOC-6908\">https:\/\/community.mcafee.com\/docs\/DOC-6908<\/a><\/p>\n<p>In addition <a href=\"https:\/\/www.mcafee.com\/us\/products\/application-control.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Application Control <\/a>gives you a full protection against DRIDEX.<\/p>\n<h2><strong><u>Conclusion:<\/u><\/strong><\/h2>\n<p>Even if DRIDEX infections technics are not new, this is always tricky to block all variants by only using signatures based approach.<\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/us\/products\/global-threat-intelligence-esm.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">GTI<\/a> activation and samples submissions are still very efficient in order to increase the global detection level.\u00a0 However the Best Approach is to build a security Connected platform and connect technologies such as <a href=\"https:\/\/www.mcafee.com\/us\/products\/threat-intelligence-exchange.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">TIE<\/a> , <a href=\"https:\/\/www.mcafee.com\/us\/products\/advanced-threat-defense.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">ATD<\/a> to work on behaviors and code analysis <a href=\"https:\/\/community.mcafee.com\/docs\/DOC-6462\">https:\/\/community.mcafee.com\/docs\/DOC-6462<\/a><\/p>\n<p>This approach gives you also the ability to share the intelligence between the different component in your network and by this way to increase your global security posture.<\/p>\n<p>Thanks to my colleagues, Emmanuel Flores, Vinoo Thomas and John Health.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[124,180,4185,4175,4535],"coauthors":[3973],"class_list":["post-45119","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-global-threat-intelligence","tag-malware","tag-phishing","tag-security-connected-2","tag-virus"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Best practices for preventing Dridex infections | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Best practices for preventing Dridex infections | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-31T23:52:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T05:06:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"721\" \/>\n\t<meta property=\"og:image:height\" content=\"718\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Best practices for preventing Dridex infections\",\"datePublished\":\"2015-08-31T23:52:45+00:00\",\"dateModified\":\"2025-06-04T05:06:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\"},\"wordCount\":717,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\",\"keywords\":[\"global threat intelligence\",\"malware\",\"Phishing\",\"security connected\",\"virus\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\",\"name\":\"Best practices for preventing Dridex infections | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\",\"datePublished\":\"2015-08-31T23:52:45+00:00\",\"dateModified\":\"2025-06-04T05:06:01+00:00\",\"description\":\"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Best practices for preventing Dridex infections\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Best practices for preventing Dridex infections | McAfee Blog","description":"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Best practices for preventing Dridex infections | McAfee Blog","og_description":"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-08-31T23:52:45+00:00","article_modified_time":"2025-06-04T05:06:01+00:00","og_image":[{"width":721,"height":718,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Premier.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Best practices for preventing Dridex infections","datePublished":"2015-08-31T23:52:45+00:00","dateModified":"2025-06-04T05:06:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/"},"wordCount":717,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg","keywords":["global threat intelligence","malware","Phishing","security connected","virus"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/","name":"Best practices for preventing Dridex infections | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg","datePublished":"2015-08-31T23:52:45+00:00","dateModified":"2025-06-04T05:06:01+00:00","description":"Mitigating\u00a0the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at various layers of McAfee security products.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Premier-300x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/preventing-dridex-infections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Best practices for preventing Dridex infections"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45119","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=45119"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45119\/revisions"}],"predecessor-version":[{"id":215069,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/45119\/revisions\/215069"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=45119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=45119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=45119"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=45119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}