#Trickbot

The Spamhaus Projectspamhaus@infosec.exchange
2025-05-23

🔥 Operation Endgame is BACK! This time targeting #BumbleBee, #Latrodectus, #DanaBot, #WarmCookie, #Qakbot and #Trickbot!

Once again this is a HUGE win, with a truly international effort! 💪

As with phase one of #OperationEndgame, Spamhaus are providing remediation support - those affected will be contacted in due course with steps to take.

For more information, read our write-up here:
👉 spamhaus.org/resource-hub/malw

#ユーロポール#IcedID#TrickBot 、その他のマルウェアに関連した100台以上のサーバーを #シャットダウン 」: The Hacker News

「ユーロポールは木曜日、 #Operation #Endgame というコード名で行われる法執行機関の連携活動の一環として、IcedID、 #SystemB C、 #PikaBo t、 #SmokeLoader#Bumblebee 、TrickBotなどのいくつかのマルウェアローダー操作に関連するインフラストラクチャを停止したと発表した 。
この措置は5月27日から5月29日までの間に行われ、 #アルメニア#オランダ#ポルトガル の16か所にわたる捜索の結果、世界中で100台以上のサーバーが解体され、アルメニアで1人、ウクライナで3人の計4人が #逮捕 された。 、そして #ウクライナ 。 」

戦禍のウクライナでも、ややこしいことをしている奴がいる。

thehackernews.com/2024/05/euro

#prattohome #TheHackerNews

2024-05-30

Today we celebrate a major cybersecurity victory. 👏 Operation Endgame, a global law enforcement effort supported by insights from experts at Proofpoint and other industry vendors, resulted in:

• The disruption of major botnets
• Four arrests
• Over 100 servers taken down across 10 countries
• Over 2,000 domains brought under the control of law enforcement
• Illegal assets frozen

Proofpoint’s mission is to provide the best human-centric protection for our customers against advanced threats. Whenever possible and appropriate to do so, Proofpoint uses its team’s knowledge and skills to help protect a wider audience against widespread malware threats.

For #OperationEndgame, Proofpoint threat researchers lent their expertise in reverse engineering malware, botnet infrastructure, and identifying patterns in how the threat actors set up their servers to help authorities understand the malware and safely remediate the bot clients.

Proofpoint’s unmatched threat telemetry and researcher knowledge played a crucial role in the operation, providing key insights in identifying the new botnets that are most likely to grow and become the dominant threats affecting the most number of people around the world.

More information on the takedown and Proofpoint’s involvement can be found in our blog: proofpoint.com/us/blog/threat-.

#IcedID #SystemBC #Pikabot #SmokeLoader #Bumblebee #Trickbot #Europol

2024-05-30

‘Operation Endgame’ Hits Malware Delivery Platforms - Law enforcement agencies in the United States and Europe today announced Operation... krebsonsecurity.com/2024/05/op #neer-do-wellnews #operationendgame #thecomingstorm #mattburgess #smokeloader #ransomware #trickbot #europol #lockbit #icedid #911s5

2024-05-30

📬 Operation Endgame ein voller Erfolg: Großoffensive gegen Malware-Familien
#Malware #Rechtssachen #BKA #Bumblebee #DrBenjaminKrause #MartinaLink #Smokeloader #Trickbot sc.tarnkappe.info/6f8f6a

Manuel 'HonkHase' AtugHonkHase@chaos.social
2024-05-30

Ach guck an, keine Festnahmen in Russland, keine #Vorratsdatenspeicherung nötig gewesen:

BKA: Bisher größter Schlag gegen weltweite Cyberkriminalität

#Trickbot #Pikabot #Ransomware
br.de/nachrichten/deutschland-

2024-01-29

Trickbot malware developer jailed for five years - A 40-year-old Russian man has been sentenced to five years and four months in prison by a... bitdefender.com/blog/hotforsec #ransomware #guestblog #lawℴ #trickbot #malware

2023-12-05

Russian hacker pleads guilty to Trickbot malware conspiracy - A 40-year-old Russian man faces a lengthy prison sentence in the United States after plea... bitdefender.com/blog/hotforsec #guestblog #lawℴ #trickbot #malware

2023-12-03

A developer of TrickBot has pleaded guilty to developing malware used in many attacks. he Trickbot malware has been used in attacks against hospitals, companies and individuals worldwide, and has led to stolen personal info and stolen funds from victim bank accounts. The developer is facing a maximum of 36 years in prison. It is good to see someone being held accountable, but unfortunately It is a constant cat and mouse game.

#cybersecurity #law #trickbot

bleepingcomputer.com/news/secu

𝙽𝙴𝚃𝚁𝙴𝚂𝙴𝙲netresec@infosec.exchange
2023-11-07

The exact same protocol, but without RC4 encryption, was also reverse engineered by Vitali Kremez (RIP 💜) in his ”Let’s Learn: Trickbot Socks5 Backconnect Module In Detail” blog post from 2017.
#TrickBot #TeamSpy #Socks5Systemz
vk-intel.org/2017/11/21/lets-l

Trickbot's backconnect "c=" URI w/ 'connect' command.
Image credit: Vitali Kremez

We just published our Netskope #Cloud and #Threat Report focused on Top Adversary Tactics and Techniques. Some highlights:

- #Spearphishing links and attachments are the top initial access techniques.
- User execution is the top execution technique
- Adversaries are favoring the use of HTTP and HTTPS for C2 connections
- The majority of adversary activity comes from criminal adversaries, with the most activity attributable to Wizard Spider, the Russian group responsible for creating the #TrickBot malware.
Finance and healthcare have the highest percentage of activity attributable to geopolitical adversary groups

netskope.com/netskope-threat-l

#cloudsecurity #cybersecurity

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst