TrickBot Linux Variants Resurface Despite Removal
According to TipsMake , efforts to take down TrickBot may have taken down much of the notorious botnet's critical infrastructure. However, the people behind the malware are not willing to let their work be taken down for good.
New shares from cybersecurity company Netscout, the authors behind TrickBot have ported their code to Linux . This is one of the efforts to expand their attack range to target more victims.
Appearing in 2016, TrickBot appears as a trojan and is a Windows-based crimeware solution that uses different modules to perform malicious actions on the victim's system such as: stealing credentials, conducting ransomware attacks.
However, over the past few weeks, the US Cyber Command and Microsoft have helped take down 94% of TrickBot's command and control (C2) servers. This includes both servers that were in use and new infrastructure that the TrickBot authors attempted to bring online to replace previously disabled servers.
Despite Microsoft's steps to stop it, TrickBot will likely find a way to restore its operations.
TrickBot's Anchor Module
In late 2019, a TrickBot backdoor framework called Anchor was discovered using the DNS protocol to surreptitiously communicate with C2 servers.
'This module allows actors — potential TrickBot customers — to leverage this framework against more advanced victims. At the same time, integrating APT attack capabilities into a monetization business model has seen the malware grow exponentially,' SentinelOne said.
According to the report by NTT researchers, the variant named 'Anchor_DNS' allows the infected client to use DNS tunneling to establish communication with the C2 server, which then transmits data with resolved IPs as responses.
Researcher Waylon Grange of Stage 2 Security discovered in July that Anchor_DNS had been ported to a new Linux backdoor called "Anchor_Linux."
How C2 Server Works Using Anchor
As Netscout's latest research has deciphered: How the bot and the C2 server communicate during the initial setup phase, the client sends "c2_command 0" to the server. Along with information about the compromised system and the bot ID. The server then responds with a "signal /1/" message to the bot.
To confirm, the bot will send a message to C2, then the server will issue a command to execute on the client. Finally, the bot will send the execution result back to the C2 server.
"Each communication with the C2 server follows a sequence of three different DNS queries," said Netscout security researcher Suweera De Souza.
List of IP addresses representing data corresponding to payload
The result of the third query is a list of IP addresses which are then parsed by the client to build the executable payload.
Corresponding to a command type, the final piece of data sent by the C2 server (numbered 0-14 in Windows, 0-4, 10-12 and 100 in Linux) executes the payload via cmd.exe or injects it into running processes such as Windows File Explorer, Notepad.
According to De Souza: "The complexity of Anchor's C2 communications and the payloads the bot carries reflect the formidable capabilities of the cybercriminals behind Trickbot. They also demonstrate a continued level of innovation and adaptability, with the fact that they quickly moved to a new platform."
You should read it
- 14 interesting Linux commands in Terminal
- Compare the most popular Linux distributions today
- 7 best Linux distributions based on Red Hat
- Basic Linux commands everyone needs to know
- What's new in Linux Kernel 5.18?
- 6 reasons why the Linux operating system often fails
- 8 best Linux distros for pentest
- Why are Linux computers still important?
May be interested
- Install LAMP Stack on Ubuntu 18.04lamp stack is a collection of open source software made up of linux operating system, apache, mysql database and php. let's explore how to install lamp stack on ubuntu 18.04.
- Instructions for configuring Reverse Proxy with the latest NGINXin today's article, tipsmake will help you learn and configure reverse proxy with nginx fully and in detail.
- Using tcpdump to analyze traffictcpdump is a network utility used to capture incoming and outgoing traffic. here's everything you need to know about using tcpdump on linux.
- Moving files between Linux systems with SCPwhen transferring files to a remote linux server, you have a few options. one of the best is to use a program called secure copy, or scp, which runs over the ssh protocol to quickly transfer files over the network to the remote system.
- How to Install ISPConfig Hosting Control Panel with Apache Web Server on Ubuntu 24.04ispconfig is an open source control panel that allows users to manage multiple servers from a single interface.
- 4 Reasons to Keep a Linux Live USB Handylinux live usb is one of the best rescue tools that every computer user should have. not only can it help restore your computer when things go wrong, but it also has a number of other significant benefits and uses. plus, it's completely free!