Security News > 2021 > June > Latvian woman charged with writing malware for the Trickbot Group
The fradulent transactions attempted against those 11 companies alone add up to $6.2 million, but the DOJ says that the Trickbot malware has infected millions of computers worldwide in the broadest possible way, hitting individuals, businesses and organisations including hospitals, schools, public utilities and governments.
Trickbot is probably best known for being what's called a banking Trojan, malware that deliberately snoops on your computer while you're performing financial transactions in order to steal your personal information and prey on your account.
As you probably know, almost all bots or zombies include a function by which they can install and activate additional malware, and the Trickbot Group took particular advantage of this "Feature" in its own code by using existing Trickbot infections not only to go after your bank accounts but also to launch ransomware attacks on your network.
Infect victims' computers with Trickbot malware designed to capture victims' online banking login credentials.
Amongst other things, Witte is alleged to have "Provided code to the Trickbot Group to operate and deploy the Trickbot ransomware module."
She is also said to have "Provided code [] for a web panel used to access victim data stored in a database," where others in the Trickbot group could look up zombies currently active in the Trickbot botnet, and access data such as credit card details already stolen from infected victims.