TrickBot is a banking trojan that deploys advanced browser manipulation techniques, server-side injections and redirection attacks. TrickBot was considered a true banking trojan in October 2016 when it implemented web injection capabilities. The trojan’s primary targets are business accounts. TrickBot originally targeted Australian banks, one Canadian bank, and regional US banks through a regular expression (RegEx) URL for a digital banking platform. Since adding the two new configurations in November 2016, the malware has targeted personal and business banking websites of financial institutions in the United Kingdom, Australia, New Zealand, Canada, and Germany, including redirection attacks – an advanced method to manipulate what victims see in their browsers – against four banks in the UK. Additionally, TrickBot has been spread using the RIG exploit kit through malvertising, by email attachments claiming to be a fax message, and by infected Microsoft Office macros using the Godzilla loader. IBM Security Intelligence researchers believe TrickBot’s operations are likely connected to the Cutwail botnet’s malware and it uses the same crypter as Vawtrak, Pushdo, and Cutwail. The trojan is very similar to the Dyre trojan which also used the Cutwail botnet as one of its distribution methods.
- November 2016: TrickBot activity rises with redirection attacks in the United Kingdom. (IBM Security Intelligence)
- April 2017: TrickBot added new redirection attacks focused on a list of private banking firms. Activity also increased to five campaigns in April, mainly targeting Australian, New Zealand, and U.K. companies. (IBM Security Intelligence)
- June 2017: Increasingly used in campaigns targeting e-banking apps, PayPal accounts, and business customer relationship management (CRMs). (BleepingComputer)
- July 2017: A new, Necurs botnet-powered Trickbot spam campaign is infecting customers of financial institutions in the U.S., U.K., New Zealand, France, Australia, Norway, Swedish, Iceland, Finland, Canada, Italy, Spain, Switzerland, Luxembourg, Belgium, Singapore, and Denmark. (Flashpoint)
- IBM’s X-Force provides a technical analysis of the TrickBot banking trojan here.