악성 프로그램 TrickBot, 자격 증명 및 피해자의 연락처를 훔치는 설계, 부가적인 모듈 "TrickBooster"를 수신.티his module allows sending malicious emails on behalf of an infected user.
"TrickBooster는 TrickBot에게 감염을 전파 할 수있는 매우 효율적인 방법을 제공합니다. By sending emails from trusted addresses within an organization TrickBot increases the odds that a would-be victim will open one of its trojanized attachments”, - writes Forbes IS reviewer Lee Mathews.
동시에, TrickBot acts very carefully – after sending letters, the malware removes them from the “sent” 폴더. By doing this, he manages to avoid detection.
연구원 깊은 본능, who discovered servers associated with TrickBot spam campaigns, claim that to date, malware operators have managed to collect more than 250 백만 email addresses.
Among them is considerable amount of Gmail, 야후 과 Hotmail mailboxes, but there are also several emails owned by governmental agencies.
“U.S.-based accounts caught up in TrickBot’s web include staff from the Department of Justice, Department of State, Homeland Security, the Postal Service, as well as the FAA, ATF, IRS and NASA. Email accounts belonging to numerous Canadian and British agencies were also found in the database”, — reported Deep Instinct specialists.
If the user’s computer is already infected with TrickBot, the malware can download the TrickBooster component separately. 그 후, malware will send a list of victim’s contacts to attackers.
그 핵심은, TrickBot is a banking Trojan. The malware is typically distributed via spearphishing emails — like bogus resumes sent to human resources or invoices sent to accounts staff. Those are typically attached in the form of weaponized Microsoft Word or Excel files.