The developers behind TrickBot have modified the banking trojan to target customers of major mobile carriers, researchers have reported.
Such man-in-the-browser attacks typically modify the page to include language and visuals designed to fool users into providing their sensitive information.
As of August, the dynamic webinjects that TrickBot uses were updated to target Verizon Wireless, T-Mobile and Sprint, according to a blog post this week from Secureworks’ Counter Threat Unit Research Team.
When infected users visit the website of any of these carriers, TrickBot’s C2 server will serve up a fake form field that asks them to enter their PIN code and, at least in certain cases, their username and password.
Noting the malicious PIN code request, Secureworks theorizes that the malware developers – a group the researchers refer to as Gold Blackburn (and affiliates) – may be interested in port-out or SIM swap fraud schemes.
Secureworks recommends that wireless device owners protect themselves by using time-based one-time password multi-factor authentication instead of SMS-based MFA, enabling PINs on mobile accounts, and avoiding using telephone numbers as a password reset option.
How useful was this post?
Click on a star to rate it!
Average rating / 5. Vote count: