Watch the companion video podcast to this report to learn more about TrickBot. https://www.csiac.org/podcast/trickbot
Today’s cyber threat is more advanced, persistent and capable. The constantly changing cyber landscape creates more fundamental gaps when it comes to conducting traffic analysis and identifying intrusion detection. These fundamental gaps are ubiquitous across the current commercial technology landscape and make organizations susceptible to zero-day exploits. Cybercriminals have identified many methods to exploit browser applications and steal credentials that are typed by the users. These types of cybercriminals and methods are known as information stealers. The most common form of information stealer gathers login information such as usernames and passwords using keyloggers, which are designed to capture user keystrokes. The Trojan malwares, specifically, Emotet and Trickbot, act as information stealers by targeting windows-based computers and banking customers. In a recent troublesome development, the ubiquitous Emotet botnet has re-emerged with a new module that siphons email messages from machines infected by the malware.
The rest of this report will be released shortly, thank you for your patience.