TrickBot 获得了一个用于监控受害者的新模块

根据 检查点, TrickBot 仍然是世界上最活跃的威胁之一, even acquiring new module for tracking victims. It also seems that TrickBot takes precedence in the ranking of the most active malware for the second month in a row.

After the Emotet botnet was destroyed by law enforcement agencies, TrickBot activity continues to grow.

所以, 在六月 2021, TrickBot attacked about 7% of companies around the world, and researchers remind that ransomware groups (例如, Ryuk and REvil) use different malware at the initial stages of infection, but the main one is still TrickBot.

Let me remind you that TrickBot is one of the largest and most successful malwares today. 恶意软件首先被发现回到 2015, 一系列备受瞩目的逮捕后不久,这显着改变了Dyre Hack群的组成.

这些年来, 恶意软件已经从旨在从银行帐户中窃取资金的经典银行特洛伊木马演变为散布其他威胁的多功能滴管 (从矿工到勒索软件和信息窃取者). 例如, TrickBot is used by such well-known ransomware as Ryuk, Conti and REvil.

在秋天 2020, a large-scale operation was carried out aimed at eliminating TrickBot. 执法机构参加了, Microsoft Defender团队的专家, 非营利组织FS-ISAC, 以及埃塞特, 流明, NTT和Symantec. 当时, many experts wrote that although Microsoft was could disable the TrickBot infrastructure, 僵尸网络最有可能 “存活” 最终,其运营商将运行新的控制服务器并继续其活动. 不幸, this is what happened.

Bitdefender experts that the malware developers have recently updated the VNC module (vncDLL), which is used after attacks on particularly important targets. The updated module is called tvncDLL and allows attackers to spy on their victim, collecting information that will allow the attack to be transferred to the most important systems on the victim’s network.

The tvncDLL module was spotted back in mid-May this year, but it is still under development, and the hack group has anupdate schedule that regularly adds new features and fixes bugs.

Analysis of the module shows that it uses a custom communication protocol and communicates with the control server through one of nine proxy IP addresses, which provides access to victims behind firewalls.

TrickBot 获得了一个新模块
Trickbot Attack Chain

The VNC module can stop TrickBot from running and even unload malware from memory. When the malware operator initiates communication, the module creates a virtual desktop with a custom interface.

During normal operation, an alternate desktop is created, which is completely controlled by the module, copying icons from the desktop, creating a custom taskbar to control its processes and a custom context menu containing various functions.wrote the Bitdefender researchers.

Using the command line, malware operators can download fresh payloads from their C&C服务器, open documents and mail, and steal other data from a compromised system.

Another option, called Native Browser, generally launches the browser using OLE automation in Internet Explorer. This feature is under development and is designed to steal passwords from Google Chrome, 火狐浏览器, Opera and Internet Explorer.

让我提醒你,我也写过 研究人员将 TrickBot 开发人员与 Diavol 勒索软件联系起来.

赫尔加·史密斯

我一直对计算机科学感兴趣, 特别是数据安全和主题, 现在被称为 "数据科学", 从我十几岁起. 在加入病毒清除团队担任主编之前, 我曾在多家公司担任网络安全专家, 包括亚马逊的一名承包商. 另一种体验: 我在雅顿大学和雷丁大学任教.

发表评论

您的电子邮件地址不会被公开. 必填字段已标记 *

本网站使用的Akismet,以减少垃圾邮件. 了解您的意见如何处理数据.

返回顶部按钮