Οι ερευνητές συνέδεσαν τους προγραμματιστές του TrickBot με ransomware Diavol

Fortinet specialists published a κανω ΑΝΑΦΟΡΑ, in which they argue that the creators of the well-known malware TrickBot (this hack group is usually called the Wizard Spider) may be involved in the development of a new Diavol ransomware.

Payloads of ransomware Diavol and Conti were deployed on various systems in early June 2021. It is noted that these ransomware are very similar and have a lot in common, from using asynchronous I/O operations during file encryption, στη χρήση σχεδόν πανομοιότυπων παραμέτρων γραμμής εντολών για τις ίδιες λειτουργίες (για παράδειγμα, δημιουργία αρχείων καταγραφής, κρυπτογράφηση δίσκων και πόρων δικτύου, scanning a network).

Ωστόσο, experts still could not find a direct connection between the Diavol ransomware and the authors of TrickBot, moreover, βρήκαν μια σειρά από σημαντικές διαφορές. Για παράδειγμα, Diavol does not have built-in checks that prevent payload from being triggered on systems in Russia and CIS countries. Επίσης, the new malware does not steal data before encryption.

The parameters used by the attackers, along with errors in the hard-coded configuration, hint that Diavol is a new tool in the arsenal of its operators, to which they are not yet fully accustomed.γράφουν οι ερευνητές.

Εν τω μεταξύ, the other day Kryptos Logic announced that it had found changes in the code of the TrickBot malware itself. Σύμφωνα με ειδικούς, since June 2021, TrickBot has been launching a new module on infected machines containing an updated version of the old banking component that tries to steal e-banking login credentials.

This component has been rewritten and now includes new methods for injecting malicious code into bank websites. Experts suggest that the new code is copied from the old Zeus banker: injections work by proxying traffic through a local SOCKS server. If online banking login pages are encountered in traffic, the traffic is modified to steal credentials or perform other malicious actions. It is assumed that in this way the developers of TrickBot are trying to compete with other banking Trojans and entice some of their customers.

TrickBot is one of the largest and most successful malware threats to date. Malware was first spotted back in 2015, shortly after a series of high-profile arrests that significantly changed the composition of the Dyre hack group.

Με τα χρόνια, malware has evolved from a classic banking Trojan designed to steal funds from bank accounts to a multifunctional dropper that spreads other threats (from miners to ransomware and info-stealers).

TrickBot και ransomware Diavol

In the fall of 2020, ένα large-scale operation was carried out aimed at eliminating TrickBot. It was attended by law enforcement agencies, specialists from the Microsoft Defender team, the non-profit organization FS-ISAC, as well as ESET, Lumen, NTT and Symantec.

At that time, many experts έγραψε that although Microsoft was able to disable the TrickBot infrastructure, most likely the botnet willsurviveand eventually its operators will put into operation new control servers and continue their activity. Δυστυχώς, this is exactly what happened.

Επιτρέψτε μου να σας υπενθυμίσω ότι μίλησα επίσης για το γεγονός ότι Το MountLocker ransomware χρησιμοποιεί API των Windows για πλοήγηση στο δίκτυο.

Helga Smith

Ενδιαφέρομαι πάντα για τις επιστήμες των υπολογιστών, ειδικά την ασφάλεια δεδομένων και το θέμα, που ονομάζεται σήμερα "επιστημονικά δεδομένα", από τα πρώτα μου χρόνια. Πριν μπείτε στην ομάδα κατάργησης ιών ως αρχισυντάκτης, Εργάστηκα ως ειδικός στον τομέα της ασφάλειας στον κυβερνοχώρο σε πολλές εταιρείες, συμπεριλαμβανομένου ενός από τους εργολάβους της Amazon. Μια άλλη εμπειρία: Έχω διδάξει σε πανεπιστήμια Arden και Reading.

Αφήστε μια απάντηση

Αυτό το site χρησιμοποιεί Akismet να μειώσει το spam. Μάθετε πώς γίνεται επεξεργασία των δεδομένων σας σχόλιο.

Κουμπί Επιστροφή στην κορυφή