TrickBot updated to target mobile carrier customers’ PIN codes

android malware

The developers behind TrickBot have modified the banking trojan to target customers of major mobile carriers, researchers have reported.

TrickBot secretly intercepts infected users’ network traffic and routes it to a malicious server. The server then injects additional HTML and JavaScript code before the web browser is able to render the page.

Such man-in-the-browser attacks typically modify the page to include language and visuals designed to fool users into providing their sensitive information.

As of August, the dynamic webinjects that TrickBot uses were updated to target Verizon Wireless, T-Mobile and Sprint, according to a blog post this week from Secureworks’ Counter Threat Unit Research Team.

When infected users visit the website of any of these carriers, TrickBot’s C2 server will serve up a fake form field that asks them to enter their PIN code and, at least in certain cases, their username and password.

Noting the malicious PIN code request, Secureworks theorizes that the malware developers – a group the researchers refer to as Gold Blackburn (and affiliates) – may be interested in port-out or SIM swap fraud schemes.

Secureworks recommends that wireless device owners protect themselves by using time-based one-time password multi-factor authentication instead of SMS-based MFA, enabling PINs on mobile accounts, and avoiding using telephone numbers as a password reset option.

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

What do you think?

41 points
Upvote Downvote

Written by C. Aliens

Leave a Reply

Your email address will not be published. Required fields are marked *

instagram phishing scam

Instagram Phishing Scam Uses Fake 2FA Code to Appear Trustworthy

arrested trial sentenced guilty plea

Alphabay Vendor Pharma Master Sentenced to Life in Prison