Researchers recently spotted a new version of Trickbot (detected as TrojanSpy.Win32.TRICKBOT.AZ and Trojan.Win32.MERETAM.AD) with new capabilities. This new Tickbot variant uses an updated version of the password-grabbing module that steals remote application credentials.
Tax incentive notification spam email
The updated version steals VNC, PuTTY, and RDP credentials
This new Trickbot variant adds three new functions, one each for stealing credentials from Virtual Network Computing (VNC), PuTTY, and Remote Desktop Protocol (RDP) platforms.
“To grab VNC credentials, the pwgrab module searches for files using the “*.vnc.lnk” affix that are located in the following directories: %APPDATA%\Microsoft\Windows\Recents and %USERPROFILE%\Documents, %USERPROFILE%\Downloads,” the researchers explained in a blog.
The stolen information includes the target machine’s hostname, port, and proxy settings.
To steal PuTTY and RDP credentials, Trickbot will look into the Software\SimonTatham\Putty\Sessions registry key and will use “the CredEnumerateA API to identify and steal saved credentials. It then parses the string ‘target=TERMSRV’ to identify the hostname, username, and password saved per RDP credential.
“The module will send the required data via POST, which is configured through a downloaded configuration file using the filename ‘dpost’. This file contains a list of command-and-control (C&C) servers that will receive the exfiltrated data from the victim,” researchers explained.
Recommendations
The researchers provide the following recommendations to safeguard against this kind of attack.
Publisher