Trickbot International botnet interception operation

The Trickbot steals users' credentials and has recently launched attacks ransomware. The ESET Research contributed to the business with technical analysis.

ESET researchers have been involved in a global crackdown on Trickbot, the botnet that has infected more than a million computers since 2016. Along with Microsoft, the Black Lotus Labs Threat Research of Lumen, the NTT and others, the company intervenes in Trickbot by destroying the command and control servers.

ESET contributed to this business by providing technical analysis, statistics and known names and IP addresses of command and control servers.

Trickbot is known to steal users' credentials from compromised computers, and more recently, it has been observed as a mechanism for carrying out more serious attacks, such as ransomware attacks.

 

ESET Research has been tracking its activities since it was first detected, in late 2016. In 2020 alone, ESET's botnet monitoring platform analyzed more than 125.000 malicious samples and downloaded and decrypted more than 40.000 configuration files used by the various Trickbot modules, providing a complete picture of the different C&C servers used from this botnet.

"For years we've been watching it, the Trickbot breaches that have been recorded are systematic, making it one of the largest and longest-running botnets out there. Trickbot is one of the most popular families malware and is a threat to internet users worldwide, ”explains Jean-Ian Boutin, Head of ESET Research at ESET.

Throughout his life, the particular έχει εξαπλωθεί με διάφορους τρόπους. Ένας από αυτούς είναι ότι το Trickbot προσβάλει συστήματα που έχουν ήδη παραβιαστεί από το , ένα άλλο γνωστό botnet. Στο παρελθόν, το κακόβουλο λογισμικό του Trickbot αξιοποιήθηκε από τους χειριστές του κυρίως ως τραπεζικό trojan, κλέβοντας διαπιστευτήρια χρηστών από online τραπεζικούς λογαριασμούς και προσπαθώντας να πραγματοποιήσει παράνομες money.

His scouts Trickbot internationally by its telemetry system ESET from October 2019 to October 2020

One of the oldest plugins developed for the platform, it allows Trickbot to use web injects, a technique that allows malware to dynamically change what a user of an infected system sees when visiting a specific website.

"Through monitoring, we collected tens of thousands of different configuration files, which allows us to know which websites the Trickbot operators were targeting. "The targeted URLs belong mainly to financial institutions," adds Boutin.

“Tackling this threat is very difficult as it has various alternative mechanisms and its interconnection with other cybercriminals in the background makes the overall of extremely complex" concludes Boutin.

For more technical details about Trickbot, visit our WeLiveSecurity blogpost "ESET takes part in global operation to disrupt Trickbot".

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).