go to sections menu

One hacking tool, trickbot, was built on old malware code from blog The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: article commentary > One hacking tool, trickbot, was built on old malware code

Go to Homepage, contents or to navigation menu



One hacking tool, trickbot, was built on old malware code

We know that Trickbot, the pervasive malware that targeted tons of different agencies for many years is probably now among the dying as its code writer is probably done for, thanks to a recent arrest we covered as part of last week’s notes and also covered on the blog.

Today’s article is entitled: Trickbot indictment demonstrates how one hacking tool built on older malware which comes from Cyberscoop.

The story starts with a film company who was affiliated with scammers who built Trickbot indictment demonstrates how one hacking tool built on older malware. This is the first time I’ve heard of Trickbot indictment demonstrates how one hacking tool built on older malware, but we do know that Trend Micro and other publications covered Trickbot like their life depended on it.

I would too, if the malware was built in such a way that it caused lots of havoc, and I may have covered my thoughts on some of the articles in the past. You can search the blog, and see if we have or not, that’s the beauty of having a blog, isn’t it?

According to the article, Dyre perpetrators were never formally charged, but this article says that Dyre was a banking trojan. This means that it waited for you to go to your bank site and then stole your credentials as you entered them in to the official site. Crooks then went in using your credentials and cleaned you out. The bank said that it was authorized because it was authenticated, even though it was not you.

Getting your money back in these instances was hard, because the bank saw your account logged in, and it was their word verses yours.

After Dyre supposedly died, Trickbot was born, and it pretty much did the same thing.

The episode exemplifies how cybercriminal groups can evolve and, drawing on old hacking tools, haunt U.S. organizations for years to come. And, as Joe Biden prepares to press Vladimir Putin on Russia-based ransomware gangs, the Dyre-TrickBot evolution offers another example of the long tail of lax law enforcement in Russia.

While I see and understand the president of Russia’s position, the fact is, the actors who are supposedly in Russia are violating the law elsewhere, and Russia must help out to apprehend these actors to show that “crime does not pay.” The fact is, Russia is relaxed, there aren’t laws broken there so we don’t care if they cause millions of dollars in damage elsewhere, it isn’t our problem. That’s what they are saying, and I don’t need to put that in quotes because it can be left up for interpretation.

There are lots of links within this article, so please feel free to go and read this if you’re interested in the story behind this massive piece of malware which is more than likely done now.

Again, the article is titled Trickbot indictment demonstrates how one hacking tool built on older malware so feel free to comment on this one for any podcast you wish, or even discuss it on the blog. The boards await you!


Informazioni sull'articolo

One hacking tool, trickbot, was built on old malware code was released on June 13, 2021 at 1:44 pm by tech in article commentary.
Last modified: June 13, 2021.


Comments (0)

No comments yet.

Leave a comment

You must be logged in to post a comment.

go to sections menu


navigation menu

go to sections menu