Get a Pentest and security assessment of your IT network.

Cyber Security

TrickBot Linux Variants Active in the Wild Despite Recent Takedown

TrickBot’s authors have moved portions of their code to Linux, according to new research. The criminals operating the financial Trojan first detected in 2016. Microsoft, US Cyber Command and Microsoft have helped to shut down 94% of TrickBot’s C2 servers. Microsoft cautioned that the threat actors behind the botnet would likely make efforts to revive their operations. A new TrickBot backdoor framework called Anchor was discovered using the DNS protocol to communicate with the C2 server. The module “allows the actors to leverage this framework against higher-profile victims,” said SentinelOne.

Source: https://thehackernews.com/2020/10/trickbot-linux-variants-active-in-wild.html

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security