Threat Management, Malware

Necurs-powered TrickBot trojan begins targeting U.S. banks with webinject capabilities

The TrickBot banking trojan has a couple of new tricks up its sleeve: leveraging the Necurs botnet to spread via spam emails, while expanding its webinject capabilities in order to victimize customers of U.S. banks, researchers from Flashpoint have reported.

In a blog post published last week, Flashpoint reported discovering this new version TrickBot, which steals banking credentials via man-in-the-browser attacks, on July 17, 2017. The Necurs-fueled campaign, named "mac1," has so far struck in at least three separate waves of spam, targeting the U.S., UK, New Zealand, France, Australia, Norway, Sweden, Iceland, Finland, Canada, Italy, Spain, Switzerland, Luxembourg, Belgium, Singapore and Denmark, the post continues.

The first wave of spam delivered emails with a zip-archived Windows Script File attachments containing obfuscated JavaScript code. One email sample pretended to be a bill from an Australian telecom company, informing the recipient that his or her payment was overdue.

Later waves eschewed the WSF scripts in favor of documents that were sabotaged with malicious macros.

When a user opens these malicious attachments, TrickBot commences the infection process, downloading its main payload, copying itself for persistence and retrieving additional modules as needed. When that same user opens a browser to visit a banking site, the malware will then use its webinject capabilities to insert a fake login page where victims unknowingly feed their banking information to the cybercriminals running the campaign.

Before switching to TrickBot, the Necurs botnet, which operates as a crimeware-as-a-service offering, had been known primarily for distributing Locky and Jaff ransomware, Flashpoint noted. "As of now, it is not entirely clear why the Locky and Jaff ransomware stopped being distributed via the Necurs botnet; however, it is likely that the TrickBot spam proliferation might currently yield higher returns for the Necurs administrator than the other ones," said Vitali Kremez, Flashpoint researcher director and a co-author of the blog post, in an email interview with SC Media.

"Since the TrickBot banking Trojan's mac1 campaign remains fueled by the powerful Necurs botnet, it will likely continue to evolve and target customers of U.S. and international financial institutions," explains the blog post, which also co-written by Paul Burbage, senior analyst. "Anti-fraud programs are an important part of many [financial institutions'] programs to detect and counter this threat to their customer base. As threats posed by malware such as TrickBot continue to emerge and their targets expand, it is crucial for all organizations and its users to be extra vigilant in their security practices."

As has been reported previously, the TrickBot trojan bears many similarities to the defunct Dyre banking trojan, which disappeared following Russian law enforcement raids of the Dyre cybercrime group. Flashpoint speculates that TrickBot's author may have intimate knowledge of Dyre or simply is borrowing its old source code.

Although Flashpoint stated that this was the first TrickBot variant to incorporate U.S. banks into its webinject configurations, there have in recent months been other reports that  referenced TrickBot attacks on U.S. financial institutions, including four investment banking firms in the U.S.

Bradley Barth

As director of community content at CyberRisk Alliance, Bradley Barth develops content for SC Media online conferences and events, as well as video/multimedia projects. For nearly six years, he wrote and reported for SC Media as deputy editor and, before that, senior reporter. He was previously a program executive with the tech-focused PR firm Voxus. Past journalistic experience includes stints as business editor at Executive Technology, a staff writer at New York Sportscene and a freelance journalist covering travel and entertainment. In his spare time, Bradley also writes screenplays.

Get daily email updates

SC Media's daily must-read of the most current and pressing daily news

By clicking the Subscribe button below, you agree to SC Media Terms and Conditions and Privacy Policy.