Trickbot hit 140.000+ Amazon, Microsoft & Google customers

Check Point  (CPR) discovered new and complex details about its development Trickbot.

The well-known banking Trojan steals and exposes the data of its victims, targeting high-profile victims. CPR has registered more than 140.000 Trickbot-infected machines since November 2020, many of which are customers of well-known companies such as Amazon, Microsoft, Google and PayPal. In total, CPR listed 60 companies whose customers have fallen victim to it over the past 14 months.

1 Chart. Companies whose customers are the target of Trickbot

compn

 

Basic details of implementing Trickbot 

- Το κακόβουλο λογισμικό είναι πολύ επιλεκτικό στον τρόπο με τον οποίο επιλέγει τους στόχους του

- Various tricks - including anti-analysis and anti-Deobfuscation - implemented inside the modules demonstrate the high technical background of its creators

- Η υποδομή του μπορεί να χρησιμοποιηθεί από διάφορες οικογένειες κακόβουλου to cause more damage to infected computers 

- Sophisticated and versatile malware with over 20 modules that can be downloaded and executed on demand

How Trickbot works:

1. The perpetrators receive a base with stolen emails and send malicious documents to the selected addresses.

2. The user downloads and opens such a document, allowing macros to be executed during the process

3. The first stage of the malware is executed and the main load of the Trickbot is downloaded.

4. The main load of the Trickbot is executed and it establishes its stay in the infected machine.

5. Trickbot utility modules can be downloaded to the infected machine on demand by the threat actors, the functionality of these modules can vary: it can spread through a compromised corporate network, steal corporate credentials, grab data on banking websites etc.

Impact

The following is a map of the percentage of organisms affected by Trickbot in each country according to CPR telemetry data:

2 Chart. Ποσοστό των οργανισμών που επηρεάστηκαν από το Trickbot (όσο πιο σκούρο είναι το χρώμα - τόσο μεγαλύτερος ο αντίκτυπος)

map 

The following is a table showing the percentage of organisms affected by Trickbot in each area:

Area

Affected organizations

Rate

Global

1 on 45

Present in several = 2.2%

APAC

1 in 30

Present in several = 3.3%

Latin America

1 in 47

Present in several = 2.1%

Europe

1 in 54

Present in several = 1.9%

Africa

1 in 57

Present in several = 1.8%

North America

1 in 69

Present in several = 1.4%

Comment by Alexander Chailytko, Cyber ​​Security, Research & Innovation Manager at Check Point Software Technologies,

"Τα νούμερα του Trickbot είναι συγκλονιστικά. Έχουμε καταγράψει πάνω από 140.000 μηχανές που στοχεύουν τους πελάτες μερικών από τις μεγαλύτερες και πιο αξιόπιστες εταιρείες στον κόσμο. Συνεχίσαμε να παρατηρούμε ότι οι δημιουργοί του Trickbot έχουν τις ικανότητες να προσεγγίζουν την ανάπτυξη κακόβουλου λογισμικού από πολύ χαμηλό επίπεδο και να δίνουν προσοχή σε μικρές λεπτομέρειες. Το Trickbot επιτίθεται σε θύματα υψηλού προφίλ για να κλέψει τα διαπιστευτήρια και να παρέχει στους χειριστές του πρόσβαση στις πύλες με ευαίσθητα δεδομένα, όπου μπορούν να προκαλέσουν ακόμη μεγαλύτερη ζημιά. Ταυτόχρονα, γνωρίζουμε ότι οι χειριστές που βρίσκονται πίσω από την εφαρμογή έχουν επίσης μεγάλη εμπειρία στην ανάπτυξη κακόβουλου λογισμικού σε υψηλό επίπεδο. Ο συνδυασμός αυτών των δύο παραγόντων είναι αυτός που επιτρέπει στο Trickbot να παραμένει μια επικίνδυνη απειλή εδώ για περισσότερό από 5 χρόνια. Προτρέπω τους χρήστες να ανοίγουν έγγραφα μόνο από αξιόπιστες πηγές και να χρησιμοποιούν διαφορετικούς κωδικούς πρόσβασης σε διαφορετικές τοποθεσίες στο διαδίκτυο".

Security tips 

1. Only open documents that you receive from trusted sources. Do not enable macro execution in documents.

2. Make sure you have the latest operating system and anti-virus updates.

3. Use different passwords on different websites.

Appendix - The list of target companies  
Company Field
Amazon E-commerce
American Express Credit Card Service
AmeriTrade Financial Services
AOL Online service provider
Associated Banc Corp. Bank Holding
BancorpSouth Banks
Bank of Montreal Investment banking
Barclays Bank Delaware Banks
Blockchain.com Cryptocurrency Financial Services
Canadian Imperial Bank of Commerce Financial Services
Capital One Bank Holding
Card Center Direct Digital Banking
Centennial Bank Bank Holding
Chase consumer banking
Citi Financial Services
Citibank Digital Banking
Citizens Financial Group Banks
Coamerica Financial Services
Columbia Bank Banks
Desjardins Group Financial Services
e-trade Financial Services
Fidelity Financial Services
Fifth Third  Banks
FundsXpress IT service management
Google Technology
GoToMyCard Financial Services
Hawaii USA Federal Credit Union Credit Union
Huntington bancshares Bank Holding
Huntington bank Bank Holding
Interactive Brokers Financial Services
JPMorgan Chase Investment banking
Keybank Banks
LexisNexis data mining
M&T Bank Banks
Microsoft Technology
Federal Navy Credit Union
paypal financial technology
PNC Bank Banks
RBCBank Banks
Robinhood Stock Trading
Royal Bank of Canada Financial Services
Schwab Financial Services
Scotiabank Canada Banks
SunTrust Bank Bank Holding
Synchrony Financial Services
Synovus Financial Services
T Rowe Price Investment Management
TD Bank Banks
TD Commercial Banking Financial Services
TIAA Insurance
Truist financial Bank Holding
US Bancorp Bank Holding
Unionbank commercial banking
USAA Financial Services
Vanguard Investment Management
Wells Fargo Financial Services
Yahoo Technology
ZoomInfo Software as a service

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
Trickbot, trickbot trojan, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).