Hjem » Nyheder » Banking Trojan TrickBot lært at spam og har allerede indsamlet 250 million e-mail adresser

Banking Trojan TrickBot lært at spam og har allerede indsamlet 250 million e-mail adresser

Malicious program TrickBot, designed to steal credentials and contacts of victims, received an additional module “TrickBooster”.

This module allows sending malicious emails on behalf of an infected user.

“TrickBooster gives TrickBot a highly-effective way to spread infection. By sending emails from trusted addresses within an organization TrickBot increases the odds that a would-be victim will open one of its trojanized attachments”, - skriver Forbes IS reviewer Lee Mathews.

På samme tid, TrickBot acts very carefullyafter sending letters, the malware removes them from the “sendt” folder. By doing this, he manages to avoid detection.

Forskere ved dyb Instinct, who discovered servers associated with TrickBot spam campaigns, claim that to date, malware operators have managed to collect more than 250 million email addresses.

Among them is considerable amount of Gmail, Yahoo og Hotmail mailboxes, but there are also several emails owned by governmental agencies.

“U.S.-based accounts caught up in TrickBot’s web include staff from the Department of Justice, Department of State, Homeland Security, the Postal Service, as well as the FAA, ATF, IRS and NASA. Email accounts belonging to numerous Canadian and British agencies were also found in the database”, — reported Deep Instinct specialists.

If the user’s computer is already infected with TrickBot, the malware can download the TrickBooster component separately. Efter det, malware will send a list of victim’s contacts to attackers.

Reference:

På sin kerne, TrickBot is a banking Trojan. The malware is typically distributed via spearphishing emailslike bogus resumes sent to human resources or invoices sent to accounts staff. Those are typically attached in the form of weaponized Microsoft Word or Excel files.

Om Trojan Killer

Carry Trojan Killer Portable på din memory stick. Vær sikker på, at du er i stand til at hjælpe din pc modstå eventuelle cyber trusler, hvor du går.

Tjek også

MageCart på Heroku Cloud Platform

Forskere har fundet flere MageCart Web Forplove On Heroku Cloud Platform

Researchers at Malwarebytes reported about finding several MageCart web skimmers on the Heroku cloud platform

Android Spyware CallerSpy

CallerSpy spyware masker som en Android chat applikation

Trend Micro eksperter opdagede malware CallerSpy, hvilke masker som en Android chat program og, …

Skriv et svar