Get a Pentest and security assessment of your IT network.

News

TrickBot’s Screenlocker Module Isn’t Meant for Ransomware Ops

TrickBot’s screenlocker feature added to a banking trojan was never intended to be used for ransomware-like operations, researchers from Fortinet revealed on Monday. Fortinet researchers have also detailed the inner-workings of another TrickBot module that scours local SQL servers for records that look like email addresses. TrickBot uses the Mimikatz password-dumping tool to steal WDigest credentials from a Windows computer’s LSA memory, where they are stored in plaintext. It is believed TrickBot authors use these email addresses to bolster their email spam lists.

Source: https://www.bleepingcomputer.com/news/security/trickbots-screenlocker-module-isnt-meant-for-ransomware-ops/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

IntelCrawler profiled Syrian Electronic Army group

News

Wikileaks Vault 7 Imperial projects revealed the 3 hacking tools Achilles, SeaPea and Aeris