Application security, Threat Management, Malware, Phishing

Black Lives Matter phishing scam looks to spread TrickBot malware

Scammers often craft social engineering schemes around major crises and news events, as demonstrated by the wealth of coronavirus-themed phishing campaigns seen this year. Now, as massive U.S. and global protests continue following the May 25 killing of George Floyd at the hands of a Minneapolis police officer, a new phishing operation is attempting to leverage the Black Lives Matter movement.

Researchers at on Wednesday warned in a series of tweets that malicious actors are attempting to spread the TrickBot modular banking trojan via phishing emails that ask recipients to "Leave a review confidentially about Black Lives Matter."

In a sample email shown in one tweet, the senders use the email address molecule@shmbidgp[.]monster and identifies themselves as "Country authority."

According to a report from BleepingComputer, the email asks recipients to fill out and return an attached document named 'e-vote_form_3438.doc.' Individuals who open the document are asked to enable malicious macros that download and execute a DLL payload onto the victim's computer.

A spokesperson from reportedly told Forbes that the campaign was "pretty big, apparently hitting U.S. mailboxes."

TrickBot's original purpose was for harvesting banking credentials, but thanks to its plug-in nature it can now also incorporate modules for a variety of purposes including brute force attacks, lateral movement, reconnaissance, data collection and exfiltration and more. It has also recently been used in campaigns in conjunction with Ryuk ransomware.

SC Media reached out to numerous security firms that specialize in email security and/or conduct phishing research to see if they have witnessed any campaigns capitalizing on the BLM movement or the ongoing unrest and protests related to Floyd's death.

"Phishing actors often capitalize on current events and use them in their phishing themes to entice victims to engage - whether clicking a link, opening an attachment or entering credentials - in order to successfully compromise their targets," said Mollie MacDougall, head of Cofense Intelligence. "We have been tracking such trends with COVID-19 and have started to observe new Black Lives Matter-themed phishing emails that deliver the TrickBot trojan via an Office macro-laden document."

"Abusing Microsoft Office macro scripting is one of the most popular and commonly used means for phishers to deliver malware. Threat actors who use this document type rely on the victim enabling the macro scripting functionality or on having already enabled it to allow their scripting to run."

Bradley Barth

As director of community content at CyberRisk Alliance, Bradley Barth develops content for SC Media online conferences and events, as well as video/multimedia projects. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Related Events

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.