TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

In episode 143 for October 19th 2020: Microsoft gets creative to help take down the TrickBot botnet, details on how attackers have been using VPN flaws to attack election support systems, and Zoom’s rollout of end-to-end encryption. ** Links mentioned … Continue reading TrickBot Takedown, VPN Flaws, Zoom End-to-End Encryption

Trickbot on the Ropes Part 2: The QQAAZZ Money Laundering Ring

While shutting down the technical aspects of malware is critical (see Trickbot on the Ropes Part 1), the real disincentive to the criminals is when you hit them hard in the money.  That was the objective of Europol’s Operation 2BaGoldMule case against … Continue reading Trickbot on the Ropes Part 2: The QQAAZZ Money Laundering Ring

This Week in Security: BleedingTooth, Bad Neighbors, and Unpickable Locks

This week, the first details of BleedingTooth leaked onto Twitter, setting off a bit of a frenzy. The full details have yet to be released, but what we know is concerning enough. First off, BleedingTooth isn’t a single vulnerability, but is a set of at least 3 different CVEs (Shouldn’t …read more

Continue reading This Week in Security: BleedingTooth, Bad Neighbors, and Unpickable Locks

After blows from Cyber Command and Microsoft, TrickBot lives on

Disrupting a well-oiled botnet, or network of compromised computers used to launch attacks, isn’t easy. It’s little surprise, then, that in the days after U.S. Cyber Command and Microsoft took aim at TrickBot, one of the world’s largest botnets, parts of the zombie computer army still appear to be active. The goal of the distinct operations carried out in recent weeks was to wound a vast, malicious network that Russian-speaking criminals had used to infect victims with ransomware. Cyber Command, the offensive hacking unit within the U.S. Department of Defense, attacked the botnet’s infrastructure. In a separate action, Microsoft carried out a court order to disable some of TrickBot’s U.S.-based computer activity. The latter move appears to have taken large chunks of the botnet’s U.S.-based servers offline, forcing TrickBot’s puppet masters to reconfigure some of their operations, and seemed to give some organizations a reprieve to shore up digital defenses. The dual actions sought to curb the ability of a criminal network to deploy ransomware on state […]

The post After blows from Cyber Command and Microsoft, TrickBot lives on appeared first on CyberScoop.

Continue reading After blows from Cyber Command and Microsoft, TrickBot lives on

Cyber Security companies dismantle Trickbot ransomware botnet

By Waqas
Trickbot was discovered in 2016 as a banking trojan but with time it was updated to ransomware botnet.
This is a post from HackRead.com Read the original post: Cyber Security companies dismantle Trickbot ransomware botnet
Continue reading Cyber Security companies dismantle Trickbot ransomware botnet

U.S. Army Says it Nuked Trickbot, but Microsoft and Chums Claim Credit

In the dog-days of last week, a shadowy group of secret sources in U.S. Cyber Command whispered to reporters that they’d disrupted a huge, ransomware-spewing botnet.
The post U.S. Army Says it Nuked Trickbot, but Microsoft and Chums Claim Credit appea… Continue reading U.S. Army Says it Nuked Trickbot, but Microsoft and Chums Claim Credit

Report: U.S. Cyber Command Behind Trickbot Tricks

A week ago, KrebsOnSecurity broke the news that someone was attempting to disrupt the Trickbot botnet, a malware crime machine that has infected millions of computers and is often used to spread ransomware. A new report Friday says the coordinated attack was part of an operation carried out by the U.S. military’s Cyber Command. Continue reading Report: U.S. Cyber Command Behind Trickbot Tricks

Hackers exploit Trump’s COVID-19 diagnosis to spread a different kind of virus

Opportunistic hackers have seized on President Donald Trump’s illness from COVID-19 to fool email recipients into clicking on malware, researchers found, in what was a quick turnaround from the news that dominated the weekend and beyond. Proofpoint said it had detected an active, “medium volume” email campaign on Wednesday sent to several hundred U.S. and Canadian organizations. The messages are designed to bamboozle victims into downloading the BazaLoader backdoor, a kind of trojan commonly linked to the developers of the TrickBot hacking tool. Scammers frequently seize on major news events to try duping victims into providing access to their sensitive data. The apparent TrickBot gang email campaign comes less than a week after Proofpoint highlighted another that swiped Democratic National Committee website language in a bid to infect potential party volunteers. In this case, emails contain subject lines like “Recent materials pertaining to the president’s illness.” The body of the messages contain a hyperlink to an attached […]

The post Hackers exploit Trump’s COVID-19 diagnosis to spread a different kind of virus appeared first on CyberScoop.

Continue reading Hackers exploit Trump’s COVID-19 diagnosis to spread a different kind of virus