Security News > 2020 > October > Microsoft on the counterattack! Trickbot malware network takes a hit
These were servers that Microsoft had tied back to the operation of a large, long-lived and destructive zombie network known as Trickbot.
Sadly, we've had to write about Trickbot many times over the years, as the criminals behind the operation have spammed out wave after wave of deviously constructed emails under a wide variety of guises, all with the ultimate goal of infecting as many victims as possible with zombie malware.
This zombie malware would regularly "Call home" to one or more the Trickbot servers for instructions on what sort of cybercriminality to indulge in next.
So Trickbot infections often added a destructive insult to an already costly injury, typically ending up in a Ryuk ransomware attack.
Prevent the download and deployment of Trickbot or any other malware in the first place, thus limiting the number of new infections.
News URL
Related news
- VEILDrive Attack Exploits Microsoft Services to Evade Detection and Distribute Malware (source)
- Hackers deploy AI-written malware in targeted attacks (source)
- N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks (source)
- New RomCom malware variant 'SnipBot' spotted in data theft attacks (source)
- Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (source)
- DOJ, Microsoft seize 107 domains used in Russia's Star Blizzard phishing attacks (source)
- Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (source)
- Microsoft issues 117 patches – some for flaws already under attack (source)
- Microsoft Detects Growing Use of File Hosting Services in Business Email Compromise Attacks (source)
- Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack (source)