The IcedID and TrickBot banking Trojans have apparently combined to create a dual that targets victims for . How did these two banking Trojans join forces? How do the actions of these Trojans compare to how they acted before they combined?

One of the most difficult aspects of an attack is monetizing access to a system, as the controls on financial transactions are tight. These controls make it difficult to electronically transfer money without using traditional financial networks — which is one reason why ransomware attacks use cryptocurrency for payments. The riskiest part of a financial attack is performed by the money mule who withdraws stolen cash from a bank account and transfers it to the handler.

Because the financial aspects are usually just one part of an attack, attackers tend to carefully segment their operations into distinct components to help prevent them from being identified; this creates a more resilient criminal . The different attack components include segments for both technical and financial aspects in which different groups might handle different parts of the overall attack. Each part needs to be successful or the attacker’s financial fraud won’t be successful.

In a recent blog post, Vitali Kremez, director of research at Flashpoint, how the IcedID and TrickBot banking Trojans seem to have combined to create a more effective attack. The attack takes place when IcedID is spammed to victims and opened and TrickBot is downloaded.

Once TrickBot is on the system, its several modules enable it to gather about the endpoint in order to determine what kind of financial fraud it should use. This next step is determined by the attack coordinator with the information from TrickBot. In previous IcedID attacks, the Emotet banking Trojan was used, but it has since been replaced by the TrickBot collaboration.

Ask the expert:
Have a question about enterprise threats? Send it via email today. (All questions are anonymous.)

Source link
Based Blockchain Network

No tags for this post.


Please enter your comment!
Please enter your name here