TrickBot Linux Variants Resurface Despite Removal
According to TipsMake , efforts to take down TrickBot may have taken down much of the notorious botnet's critical infrastructure. However, the people behind the malware are not willing to let their work be taken down for good.
New shares from cybersecurity company Netscout, the authors behind TrickBot have ported their code to Linux . This is one of the efforts to expand their attack range to target more victims.
Appearing in 2016, TrickBot appears as a trojan and is a Windows-based crimeware solution that uses different modules to perform malicious actions on the victim's system such as: stealing credentials, conducting ransomware attacks.
However, over the past few weeks, the US Cyber Command and Microsoft have helped take down 94% of TrickBot's command and control (C2) servers. This includes both servers that were in use and new infrastructure that the TrickBot authors attempted to bring online to replace previously disabled servers.
Despite Microsoft's steps to stop it, TrickBot will likely find a way to restore its operations.
TrickBot's Anchor Module
In late 2019, a TrickBot backdoor framework called Anchor was discovered using the DNS protocol to surreptitiously communicate with C2 servers.
'This module allows actors — potential TrickBot customers — to leverage this framework against more advanced victims. At the same time, integrating APT attack capabilities into a monetization business model has seen the malware grow exponentially,' SentinelOne said.
According to the report by NTT researchers, the variant named 'Anchor_DNS' allows the infected client to use DNS tunneling to establish communication with the C2 server, which then transmits data with resolved IPs as responses.
Researcher Waylon Grange of Stage 2 Security discovered in July that Anchor_DNS had been ported to a new Linux backdoor called "Anchor_Linux."
How C2 Server Works Using Anchor
As Netscout's latest research has deciphered: How the bot and the C2 server communicate during the initial setup phase, the client sends "c2_command 0" to the server. Along with information about the compromised system and the bot ID. The server then responds with a "signal /1/" message to the bot.
To confirm, the bot will send a message to C2, then the server will issue a command to execute on the client. Finally, the bot will send the execution result back to the C2 server.
"Each communication with the C2 server follows a sequence of three different DNS queries," said Netscout security researcher Suweera De Souza.
List of IP addresses representing data corresponding to payload
The result of the third query is a list of IP addresses which are then parsed by the client to build the executable payload.
Corresponding to a command type, the final piece of data sent by the C2 server (numbered 0-14 in Windows, 0-4, 10-12 and 100 in Linux) executes the payload via cmd.exe or injects it into running processes such as Windows File Explorer, Notepad.
According to De Souza: "The complexity of Anchor's C2 communications and the payloads the bot carries reflect the formidable capabilities of the cybercriminals behind Trickbot. They also demonstrate a continued level of innovation and adaptability, with the fact that they quickly moved to a new platform."
You should read it
- 14 interesting Linux commands in Terminal
- Compare the most popular Linux distributions today
- 7 best Linux distributions based on Red Hat
- Basic Linux commands everyone needs to know
- What's new in Linux Kernel 5.18?
- 6 reasons why the Linux operating system often fails
- 8 best Linux distros for pentest
- Why are Linux computers still important?
May be interested
- Should the armpit be removed with a mini hair removal machine at home?the home mini hair removal machine can remove armpits quickly and effectively without causing a burning sensation or discomfort for the user.
- New free malware scanning tool for Linuxsecurity firm kaspersky has just launched a new free malware scanning tool for linux called kvrt (kaspersky virus removal tool) that allows users to scan the entire system and remove malware and malicious ads. harm and other known threats.
- How is Arch Linux different from other Linux versions?arch linux is arguably the most misunderstood linux distribution. many people find arch difficult to install and maintain.
- Common mistakes when using hair removal machinesif you have ever used a hair removal device, you probably know that it is necessary to test it. however, not everyone knows how to use it properly. here are some common mistakes when using a hair removal device.
- Microsoft released anti-Zotob programyesterday, august 18, microsoft released a new version of the malicious software removal tool to combat new variants of zotob worms that endanger computers that haven't patched security.
- How to delete malicious programs using Kaspersky Virus Removal Toolkaspersky virus removal tool is a tool to detect and remove malware, spyware, viruses, trojans, rootkits on computers.
- Prevent WannaCry variants by turning off this Windows 10 installationthe recent attack on wannacry has caused fever for the online community. although it has settled down, we should still be careful by protecting the computer from its variants. in this article, tipsmake.com will guide readers to prevent wannacry variants by turning off an installation on windows 10.
- 4 ways to remove hair at home with natural ingredientsno need to spend money on spa, you can still remove ugly foot hairs with 4 simple natural cleansing methods that are effective at home.
- 14 interesting Linux commands in Terminalterminal is a very powerful tool, but it can become 'interesting' through a few bash commands that quantrimang will introduce to you later. let's follow up and find out because some commands are quite useful.
- 18 Interesting Linux Commands in Terminalterminal is a very powerful tool, but it can be made 'interesting' through a few bash commands that tipsmake.com will introduce to you below. let's follow and learn because some commands are quite useful.