TrickBot attention, replaces SIM cards

Administrators of the TrickBot trojan - one of the most active and widespread malware today - are now able to carry out SIM replacement attacks (SIM swapping attacks).

This has been seen over the last month as the developers of TrickBot seem to have developed a που μπορεί να παρεμποδίσει τα διαπιστευτήρια σύνδεσης και τους κωδικούς PIN για λογαριασμούς από διάφορες mobile phone provider.

TrickBot

The data collected by TrickBot can allow malicious application administrators to carry out so-called SIM replacement attacks by transferring a victim's phone number to a SIM card under their control.

This of course allowed TrickBot administrators to bypass two-factor authentication using SMS and reset passwords to bank accounts, email accounts, or portals.of cryptocurrencies.

For the past two years, SIM replacement attacks have been one of their favorite techniques targeting financial services.

It is worth mentioning that TrickBot was developed as a targeted trojan simple banking operations in 2016. Σήμερα έχει εξελιχθεί σε ένα μοντέλο Access-as-a-Service. Τι σημαίνει αυτό; Οι απατεώνες πίσω από το TrickBot επιτρέπουν και σε άλλους κακόβουλους προγραμματιστές να αναπτύξουν κακόβουλα προon computers that are already infected.

This allowed TrickBot authors to develop close ties with many other cybercrime "colleagues" and Secureworks (the security company that revealed the latest action of the trojan) fears that they could use these relationships to share or sell the data they have managed to collect in the last month.

_________________________

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).