In one of the more disturbing turns of cybercrime, two nefarious and successful botnet operators are now collaborating in their attacks on banks and other financial institutions. Threatpost reports that the operators behind IcedID and TrickBot are working together and sharing profits.
This is interesting and disconcerting for a number of reasons:
- Collaboration gives both groups more human power to work with, which likely means greater success for account takeovers.
- The operation reveals an evolution in the cybercrime economy. Threat actors are looking for ways to cooperate with each other rather than compete for victims.
- Collaboration allows the criminals to have additional and more sophisticated attack resources that allow them to expand the severity of the attack.
In short, the whole of this collaboration is greater than the sum of its parts.
What is IcedID?
IcedID is a banking trojan that was discovered in the wild last year. Similar to VPNFilter, this malware is modular and can download specific plugins to customize the attack. It is capable of self-propagating through a network and seems to be designed to servers and endpoints. It also leverages LDAP queries to find network users. When first discovered, it was being distributed by the infection service Emotet. IcedID is delivered directly as spam.
What is TrickBot?
Malwarebytes published their first analysis of TrickBot in 2016. It was unknown at the time, and they were able to determine that it was a bot with similar features and solutions to Dyreza. Development on TrickBot continued and in 2017 there were new modules and capabilities reported by Malwarebytes here and the Security Art Work report here (pdf). In this collaborative attack, TrickBot is downloaded after a successful IcedID spam attack. Once TrickBot is activated it will download more malware based on the attack configuration.
The key to maximizing the profit from this crime partnership is coordination of the botmasters and their effectiveness in managing the collaboration. Flashpoint describes the botmaster role in detail here. A typical botmaster will monitor activity, parse the collected data, and then hand the relevant data off to other group members who will use it to attempt account takeovers and other attacks.
The human piece of this collaboration is what makes it so powerful. With more people, more attention can be paid to attack customization. Some targets are more valuable for network penetration, while others will provide more profit through cryptocurrency mining. This is all up to the actors behind the botnet.
The importance of email protection cannot be overstated. Email remains the number one threat vector, and successful defense requires multiple layers of security. Barracuda offers a full suite of email protection including Barracuda Sentinel which provides advanced protection from phishing and social engineering.
Christine Barry ist Senior Chief Blogger und Social Media Manager bei Barracuda. In dieser Rolle hilft sie, Barracuda-Geschichten zum Leben zu erwecken und die Kommunikation zwischen der Öffentlichkeit und den internen Barracuda-Teams zu erleichtern. Bevor sie zu Barracuda kam, war Christine über 15 Jahre lang als Außendiensttechnikerin und Projektmanagerin für K12- und KMU-Kunden tätig. Sie hat mehrere Abschlüsse in Technologie, einen Bachelor of Arts und einen Master of Business Administration. Sie ist Absolventin der University of Michigan.
Vernetzen Sie sich hier auf LinkedIn mit Christine.