{"id":5221,"date":"2020-10-13T11:00:58","date_gmt":"2020-10-13T08:00:58","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=5221"},"modified":"2020-10-13T18:00:27","modified_gmt":"2020-10-13T15:00:27","slug":"eset-takes-part-in-global-operation-to-disrupt-trickbot","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/","title":{"rendered":"ESET takes part in global operation to disrupt Trickbot"},"content":{"rendered":"\n<p>ESET has collaborated with partners Microsoft, Lumen\u2019s Black Lotus Labs, NTT Ltd. and others in an attempt to disrupt Trickbot botnets. ESET contributed to the project by providing technical analysis, statistical information, and known command and control server domain names and IPs.<\/p>\n\n\n\n<p>Trickbot has infected over a million computing devices around the world since late 2016 and we have been tracking its activities since the beginning. In 2020 alone, our automatic platform analyzed more than 125,000 malicious samples and downloaded and decrypted more than 40,000 configuration files used by the different Trickbot modules, giving us an excellent viewpoint of the different C&amp;C servers used by this botnet.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trickbot, a long-lasting botnet<\/h2>\n\n\n\n<p>Trickbot has been a major nuisance for internet users for a long time. ESET\u2019s first detection for Trickbot was created in late 2016. During these years, Trickbot compromises have been reported in a steady manner, making it one of the largest and longest-lived botnets out there. As reported in our&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/04\/ESET_Threat_Report_Q12020.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Report Q1 2020<\/a>, Trickbot is one of the most prevalent banking malware families. As seen in Figure 1, ESET telemetry data shows that this malware strain represents a threat for internet users globally.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"511\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020-1024x511.png\" alt=\"\" class=\"wp-image-5237\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020-1024x511.png 1024w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020-190x95.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020-768x383.png 768w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-1.-Worldwide-Trickbot-detections-between-October-2019-and-Octber-2020.png 1373w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 1. Worldwide Trickbot detections between October 2019 and October 2020<\/em><\/p>\n\n\n\n<p>Throughout its existence, Trickbot malware has been distributed in a number of ways. Recently, a chain we observed frequently is Trickbot being dropped on systems already compromised by Emotet, another large botnet. In the past, Trickbot malware was leveraged by its operators mostly as a banking trojan, stealing credentials from online bank accounts and trying to perform fraudulent transfers.<\/p>\n\n\n\n<p>Trickbot\u2019s modular architecture allows it to perform a vast array of malicious actions using a variety of plugins. It can steal all kinds of credentials from a compromised computer and, more recently, has been observed mostly as a delivery mechanism for more damaging attacks, such as ransomware.<\/p>\n\n\n\n<p>One of the oldest plugins developed for the platform allows Trickbot to use&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.welivesecurity.com\/2014\/10\/23\/evolution-webinject\/\" target=\"_blank\">web injects<\/a>, a technique allowing the malware to dynamically change what the user of a compromised system sees when visiting specific websites. To operate, this plugin relies on configuration files downloaded by the main module. These contain information about which websites should be modified and how. Figure 2 shows an excerpt of one such decrypted configuration file containing targeted URLs and the malicious C&amp;C URLs the bot should contact upon the victim accessing the targeted URLs.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"959\" height=\"456\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/fig_2.png\" alt=\"\" class=\"wp-image-5234\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/fig_2.png 959w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/fig_2-190x90.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/fig_2-768x365.png 768w\" sizes=\"auto, (max-width: 959px) 100vw, 959px\" \/><\/figure>\n\n\n\n<p><em>Figure 2. Excerpt of a decrypted&nbsp;dinj&nbsp;configuration file (redacted)<\/em><\/p>\n\n\n\n<p>Through our monitoring of Trickbot campaigns, we collected tens of thousands of different configuration files, allowing us to know which websites were targeted by Trickbot\u2019s operators. Figure 3 shows the number of websites extracted from configuration files in 2020.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"582\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020-1024x582-1.png\" alt=\"\" class=\"wp-image-5240\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020-1024x582-1.png 1024w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020-1024x582-1-190x108.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020-1024x582-1-768x437.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-3.-Number-of-targeted-websites-in-2020.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><em>Figure 3. Number of targeted websites in 2020<\/em><\/p>\n\n\n\n<p>These targeted URLs mostly belong to financial institutions. There is a sharp drop in the number of targets found in these configuration files starting in March. This coincides with the moment when Trickbot operators dropped the webinject module from the list of default plugins downloaded automatically by the main module \u2014 this is why we have no data in March; we had to adjust our processes to maintain visibility on the targeted URLs. This drop in number of targets is likely due to the Trickbot gang starting to focus on another means of monetization during that time frame: ransomware.<\/p>\n\n\n\n<p>In these cases, a Trickbot compromise is first leveraged to perform reconnaissance and lateral movement in an organization\u2019s network and then to drop Ryuk ransomware on as many systems as possible. From the data we have collected, it appears that Trickbot\u2019s operators moved from attempting to steal money from bank accounts, to compromising a whole organization with Trickbot and then using it to execute Ryuk and demand a ransom to unlock the affected systems.<\/p>\n\n\n\n<p>We also observed new malware development projects allegedly coming from Trickbot\u2019s operators, which might also explain their sudden disinterest in operating Trickbot as a banking trojan. One of these projects is the so-called&nbsp;<a href=\"https:\/\/labs.sentinelone.com\/the-deadly-planeswalker-how-the-trickbot-group-united-high-tech-crimeware-apt\/\" target=\"_blank\" rel=\"noreferrer noopener\">Anchor<\/a>&nbsp;project, a platform mostly geared towards espionage rather than crimeware. They are also likely involved in the development of the&nbsp;<a href=\"https:\/\/www.cybereason.com\/blog\/a-bazar-of-tricks-following-team9s-development-cycles\" target=\"_blank\" rel=\"noreferrer noopener\">Bazar<\/a>&nbsp;malware \u2014 a loader and backdoor used to deploy malware, such as ransomware, and to steal sensitive data from compromised systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trickbot deep dive<\/h2>\n\n\n\n<p>What makes Trickbot so versatile is that its functionalities can be greatly extended with plugins. Throughout our tracking, we were able to collect and analyze 28 different plugins. Some are meant to harvest passwords from browsers, email clients and a variety of applications, while others can modify network traffic or self-propagate. Trickbot plugins are implemented as standard Windows DLLs, usually with at least these four distinctive exports:&nbsp;Start,&nbsp;Control,&nbsp;Release&nbsp;and&nbsp;FreeBuffer.<\/p>\n\n\n\n<p>Interestingly, some have&nbsp;<a href=\"https:\/\/www.virusbulletin.com\/uploads\/pdf\/magazine\/2019\/VB2019-Kalnai-Poslusny.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Rich headers<\/a>&nbsp;while some do not. Rich headers are an undocumented data structure added to all binaries built by Microsoft Visual Studio 97 SP3 or later. They contain information about the development environment where the executable was built. The fact that Rich headers are not always present in plugins \u2014 and that when they are present, they show different development environments \u2014 leads us to believe that these plugins were written by different developers.<\/p>\n\n\n\n<p>We did not observe many different samples of the different plugins once they were developed and used in the wild. The ones that changed the most are those containing a static configuration file embedded in the binary. These static configuration files contain, among other things, C&amp;C server information, so it is expected to see these change over time. Figure 4 displays the number of variations we saw for each module we collected through our botnet tracker platform. Most of the newer modules\u2019 variants come in pairs: about half of the collected modules were 32-bit versions, while the other half were the 64-bit versions. In the&nbsp;<em>Appendix<\/em>&nbsp;you can find a brief description of each of these modules.<br><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-4.-Variant-count-for-each-Trickbot-plugin.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"870\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-4.-Variant-count-for-each-Trickbot-plugin.png\" alt=\"\" class=\"wp-image-5246\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-4.-Variant-count-for-each-Trickbot-plugin.png 864w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-4.-Variant-count-for-each-Trickbot-plugin-127x128.png 127w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-4.-Variant-count-for-each-Trickbot-plugin-768x773.png 768w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/figure>\n\n\n\n<p><em>Figure 4. Variant count for each Trickbot plugin<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Configuration files for everyone<\/h3>\n\n\n\n<p>Although there are potentially many different downloaded configuration files present in a Trickbot installation, the main module contains an encrypted, hardcoded configuration. This contains a list of C&amp;C servers as well as a default list of plugins that should be download.<\/p>\n\n\n\n<p>As mentioned earlier, some plugins also rely on configuration files to operate properly. These plugins rely on the main module to download these configuration files from the C&amp;C servers. Plugins achieve this by passing a small module configuration structure, stored in the plugin binary\u2019s overlay section, that lets the main module know what it should download.<\/p>\n\n\n\n<p>Being able to gather these configuration files allowed us to map the network infrastructure of Trickbot. The main module uses its list of hardcoded C&amp;C servers and connects to one of them to download a second list of C&amp;C servers, the so-called&nbsp;psrv&nbsp;list. The main module contacts this second layer of C&amp;C servers to download the default plugins specified in the hardcoded configuration file. Other modules can be downloaded later upon receiving a command to do so from the Trickbot operators. Some of the plugins, such as the injectDll plugin, for example, have their own C&amp;C servers, which contain configuration files. Finally, there are dedicated C&amp;C servers for plugins. The most prevalent of them are so-called&nbsp;dpost&nbsp;servers, used to exfiltrate stolen data such as credentials but, as detailed in the&nbsp;<em>Appendix<\/em>, others exist. All these different layers make the disruption effort more challenging. Figure 5 illustrates this initial communication process.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-5.-Trickbot-network-communication-process.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"949\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-5.-Trickbot-network-communication-process-1024x949-1.png\" alt=\"\" class=\"wp-image-5249\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-5.-Trickbot-network-communication-process-1024x949-1.png 1024w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-5.-Trickbot-network-communication-process-1024x949-1-138x128.png 138w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-5.-Trickbot-network-communication-process-1024x949-1-768x712.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 5. Trickbot network communication process<\/em><\/p>\n\n\n\n<p>We have been tracking these different C&amp;C servers since early 2017. This knowledge was, of course, vital in the disruption effort, since we were able to contribute to mapping the network infrastructure used by the malicious actors.<\/p>\n\n\n\n<p>Another interesting artifact we were able to gather through crawling this botnet is the unique identifier present in each Trickbot sample, the so-called&nbsp;gtag. This a string present in the initial hardcoded configuration file identifying different Trickbot campaigns or mode of compromise. For example, the&nbsp;mor&nbsp;campaigns are&nbsp;<a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Emotet+epoch+1+infection+with+Trickbot+gtag+mor84\/25752\/\" target=\"_blank\" rel=\"noreferrer noopener\">believed<\/a>&nbsp;to be Trickbot compromises due to Emotet.&nbsp;gtags&nbsp;can also sometimes indicate the target of a campaign. A good example is&nbsp;uk03-1, which predominantly targeted financial institutions in the United Kingdom.<\/p>\n\n\n\n<p>Figure 6 presents a timeline of all&nbsp;gtags&nbsp;we extracted from Trickbot configuration files from September 2019 to September 2020. Looking at the&nbsp;mor&nbsp;group, we can see the abrupt stop of the Emotet campaigns in April 2020. There are also some groups that are used by specific modules. The&nbsp;tot,&nbsp;jim&nbsp;and&nbsp;lib&nbsp;groups are some of the most continuously seen&nbsp;gtags&nbsp;and are associated with the mshare, nworm\/mworm and tab modules respectively, according to a recent Unit42&nbsp;<a href=\"https:\/\/unit42.paloaltonetworks.com\/goodbye-mworm-hello-nworm-trickbot-updates-propagation-module\/\" target=\"_blank\" rel=\"noreferrer noopener\">blogpost<\/a>. As all of these are used for lateral movement, it is not surprising to see a mostly constant line in their timeline.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2020\/10\/Figure-6.-gtags-group-timeline.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"579\" src=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-6.-gtags-group-timeline-1024x579-1.png\" alt=\"\" class=\"wp-image-5252\" srcset=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-6.-gtags-group-timeline-1024x579-1.png 1024w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-6.-gtags-group-timeline-1024x579-1-190x107.png 190w, https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/Figure-6.-gtags-group-timeline-1024x579-1-768x434.png 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Figure 6.&nbsp;gtags&nbsp;group timeline<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Closing remarks<\/h2>\n\n\n\n<p>Trying to disrupt an elusive threat such as Trickbot is very challenging and complex. It has various fallback mechanisms and its interconnection with other highly active cybercriminal actors in the underground makes the overall operation extremely complex. We will continue to track this threat and assess the impact that such actions can have on such a sprawling botnet in the long run.<\/p>\n\n\n\n<p><em>Special thanks to Jakub Tomanek, Jozef D\u00fac, Zolt\u00e1n Rusn\u00e1k and Filip Maz\u00e1n<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ESET detection names<\/h2>\n\n\n\n<p>Win32\/TrickBot<br>Win64\/TrickBot<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">MITRE ATT&amp;CK techniques<\/h2>\n\n\n\n<p><em>Note: This table was built using&nbsp;<\/em><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>version 7<\/em><\/a><em>&nbsp;of the MITRE ATT&amp;CK framework.<\/em><\/p>\n\n\n\n<figure id=\"tablepress-883\" class=\"wp-block-table\"><table><thead><tr><th>Tactic<\/th><th>ID<\/th><th>Name<\/th><th>Description<\/th><\/tr><\/thead><tbody><tr><td>Initial Access<\/td><td><a href=\"https:\/\/attack.mitre.org\/techniques\/T1566\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1566.001<\/a><\/td><td>Phishing: Spearphishing Attachment<\/td><td>Trickbot has used an email with an Excel sheet containing a malicious macro to deploy the malware.<\/td><\/tr><tr><td>Execution<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1059\/003\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1059.003<\/a><\/td><td>Command and Scripting Interpreter: Windows Command Shell<\/td><td>Trickbot has used&nbsp;cmd.exe \/c&nbsp;to download and deploy the malware on the user\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1059\/005\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1059.005<\/a><\/td><td>Command and Scripting Interpreter: Visual Basic<\/td><td>Trickbot has used macros in Excel documents to download and deploy the malware on the user\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1106\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1106<\/a><\/td><td>Native API<\/td><td>Trickbot uses the Windows API&nbsp;CreateProcessW&nbsp;to manage execution flow.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1204\/002\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1204.002<\/a><\/td><td>User Execution: Malicious File<\/td><td>Trickbot has attempted to get users to launch a malicious Excel attachment to deliver its payload.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1059\/007\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1059.007<\/a><\/td><td>Command and Scripting Interpreter: JavaScript\/Jscript<\/td><td>Trickbot group used obfuscated JavaScript to download Trickbot loader.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1559\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1559.001<\/a><\/td><td>Inter-Process Communication: Component Object Model<\/td><td>Trickbot used COM to setup scheduled task for persistence.<\/td><\/tr><tr><td>Persistence<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1547\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1547.001<\/a><\/td><td>Boot or Logon Autostart Execution: Registry Run Keys \/ Startup Folder<\/td><td>Trickbot establishes persistence in the Startup folder.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1053\/005\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1053.005<\/a><\/td><td>Scheduled Task\/Job: Scheduled Task<\/td><td>Trickbot creates a scheduled task on the system that provides persistence.<\/td><\/tr><tr><td>Privilege Escalation<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1055\/012\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1055.012<\/a><\/td><td>Process Injection: Process Hollowing<\/td><td>Trickbot injects into the&nbsp;svchost.exe&nbsp;process.<\/td><\/tr><tr><td>Defense Evasion<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1140\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1140<\/a><\/td><td>Deobfuscate\/Decode Files or Information<\/td><td>Trickbot decodes its configuration data and modules.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1562\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1562.001<\/a><\/td><td>Impair Defenses: Disable or Modify Tools<\/td><td>Trickbot can disable Windows Defender.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1112\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1112<\/a><\/td><td>Modify Registry<\/td><td>Trickbot can modify registry entries.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1027\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1027<\/a><\/td><td>Obfuscated Files or Information<\/td><td>Trickbot uses non-descriptive names to hide functionality and uses an AES-CBC (256 bits) encryption algorithm for its loader and configuration files.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1027\/002\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1027.002<\/a><\/td><td>Software Packing<\/td><td>Trickbot leverages a custom packer to obfuscate its functionality.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1553\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1553<\/a><\/td><td>Subvert Trust Controls<\/td><td>Trickbot uses signed loaders with stolen valid certificates.<\/td><\/tr><tr><td>Credential Access<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1555\/003\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1555.003<\/a><\/td><td>Credentials from Password Stores: Credentials from Web Browsers<\/td><td>Trickbot can obtain passwords stored by web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1056\/004\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1056.004<\/a><\/td><td>Input Capture: Credential API Hooking<\/td><td>Trickbot has the ability to capture RDP credentials by capturing the&nbsp;CredEnumerateA&nbsp;API.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1552\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1552.001<\/a><\/td><td>Unsecured Credentials: Credentials In Files<\/td><td>Trickbot can obtain passwords stored by several applications such as Outlook, Filezilla, and WinSCP. Additionally, it searches for the&nbsp;.vnc.lnk&nbsp;suffix to steal VNC credentials.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1552\/002\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1552.002<\/a><\/td><td>Unsecured Credentials: Credentials in Registry<\/td><td>Trickbot can retrieve PuTTY credentials from the&nbsp;Software\\SimonTatham\\Putty\\Sessions&nbsp;registry key.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1110\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1110<\/a><\/td><td>Brute Force<\/td><td>Trickbot uses brute-force attack against RDP with rdpscanDll module.<\/td><\/tr><tr><td>Discovery<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1087\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1087.001<\/a><\/td><td>Account Discovery: Local Account<\/td><td>Trickbot collects the users of the system.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1087\/003\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1087.003<\/a><\/td><td>Account Discovery: Email Account<\/td><td>Trickbot collects email addresses from Outlook.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1082\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1082<\/a><\/td><td>System Information Discovery<\/td><td>Trickbot gathers the OS version, CPU type, amount of RAM available from the victim\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1083\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1083<\/a><\/td><td>File and Directory Discovery<\/td><td>\n                    Trickbot searches the system for all of the following file extensions: .avi, .mov, .mkv, .mpeg, .mpeg4, .mp4, .mp3, .wav, .ogg, .jpeg, .jpg, .png, .bmp, .gif, .tiff, .ico, .xlsx, and .zip. It can also obtain browsing\n                    history, cookies, and plugin information.\n                <\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1016\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1016<\/a><\/td><td>System Network Configuration Discovery<\/td><td>Trickbot obtains the IP address and other relevant network information from the victim\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1007\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1007<\/a><\/td><td>System Service Discovery<\/td><td>Trickbot collects a list of installed programs and services on the system\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1135\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1135<\/a><\/td><td>Network Share Discovery<\/td><td>Trickbot module shareDll\/mshareDll discovers network shares via the&nbsp;WNetOpenEnumA&nbsp;API.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1057\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1057<\/a><\/td><td>Process Discovery<\/td><td>Trickbot uses module networkDll for process list discovery.<\/td><\/tr><tr><td>Lateral Movement<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1210\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1210<\/a><\/td><td>Exploitation of Remote Services<\/td><td>Trickbot utilizes EthernalBlue and EthernalRomance exploits for lateral movement in the modules wormwinDll, wormDll, mwormDll, nwormDll, tabDll.<\/td><\/tr><tr><td>Collection<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1005\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1005<\/a><\/td><td>Data from Local System<\/td><td>Trickbot collects local files and information from the victim\u2019s local machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1185\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1185<\/a><\/td><td>Man in the Browser<\/td><td>Trickbot uses web injects and browser redirection to trick victims into providing their login credentials on a fake or modified web page.<\/td><\/tr><tr><td>Command and Control<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1071\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1071.001<\/a><\/td><td>Application Layer Protocol: Web Protocols<\/td><td>Trickbot uses HTTPS to communicate with its C&amp;C servers, to get malware updates, modules that perform most of the malware logic and various configuration files.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1573\/001\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1573.001<\/a><\/td><td>Encrypted Channel: Symmetric Cryptography<\/td><td>Trickbot uses a custom crypter leveraging Microsoft\u2019s CryptoAPI to encrypt C&amp;C traffic.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1105\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1105<\/a><\/td><td>Ingress Tool Transfer<\/td><td>Trickbot downloads several additional files and saves them to the victim\u2019s machine.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1571\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1571<\/a><\/td><td>Non-Standard Port<\/td><td>Some Trickbot samples have used HTTP over ports 447 and 8082 for C&amp;C.<\/td><\/tr><tr><td> <\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1219\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1219<\/a><\/td><td>Remote Access Software<\/td><td>Trickbot uses vncDll module to remote control the victim machine.<\/td><\/tr><tr><td>Exfiltration<\/td><td><a href=\"https:\/\/attack.mitre.org\/versions\/v7\/techniques\/T1041\/\" rel=\"noreferrer noopener\" target=\"_blank\">T1041<\/a><\/td><td>Exfiltration Over C2 Channel<\/td><td>Trickbot exfiltrates data over the C&amp;C channel using HTTP POST requests.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Appendix<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Lateral movement modules<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><em>shareDll, mshareDll, tshareDll<\/em><ul><li>Modules used to propagate Trickbot loader to connected network shares of the victimized machine.<\/li><\/ul><\/li><li><em>wormwinDll, wormDll, mwormDll, nwormDll<\/em><ul><li>Modules used for spreading inside a local network of infected machines via SMB. It uses the EternalBlue exploit.<\/li><\/ul><\/li><li><em>tabDll<\/em><ul><li>Module used to spread into the network using the EternalRomance exploit.<\/li><\/ul><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Infostealers<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>pwgrab<ul><li>Password stealer module.<\/li><\/ul><\/li><li>systeminfo<ul><li>Module used for gathering information about the victim machine.<\/li><\/ul><\/li><li>domainDll<ul><li>Module used for stealing credentials and other data from the Domain Controller via LDAP.<\/li><\/ul><\/li><li>networkDll<ul><li>Module used to collect system information and network topology.<\/li><\/ul><\/li><li>outlookDll<ul><li>Module used for stealing credentials from Microsoft Outlook.<\/li><\/ul><\/li><li>importDll<ul><li>Module used for stealing browser information such as cookies, browser history, configurations.<\/li><\/ul><\/li><li>mailsearcher<ul><li>Module used to search for files on the victim machine against a list of hardcoded extensions (documents, images, video).<\/li><\/ul><\/li><li>cookiesDll<ul><li>Web browser cookie stealer module.<\/li><\/ul><\/li><li>squlDll<ul><li>Module used to harvest email addresses from the SQL server and scrape credentials from the infected system with the Mimikatz utility.<\/li><\/ul><\/li><li>aDll<ul><li>Steals Active Directory database.<\/li><\/ul><\/li><li>psfin<ul><li>Module queries the Active Directory for specific string constants which are related to Point-of-Sale software.<\/li><\/ul><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Network abuse<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>injectDll<ul><li>Webinject module.<\/li><\/ul><\/li><li>NewBCtestDll, NewBCtestnDll<ul><li>Module that is a reverse proxy and is able to execute commands.<\/li><\/ul><\/li><li>vncDll<ul><li>Module used as a RAT on the victim machine.<\/li><\/ul><\/li><li>vpnDll<ul><li>Module used to create VPN proxy routed to a given address.<\/li><\/ul><\/li><li>rdpscanDll<ul><li>Module used for brute forcing RDP on a certain list of targets.<\/li><\/ul><\/li><li>bcClientDllTestTest<ul><li>An old module used to proxy Trickbot operator traffic through a victim machine.<\/li><\/ul><\/li><li>shadnewDll<ul><li>Man-in-the-Browser module. It contains a full implementation of&nbsp;<a href=\"https:\/\/malpedia.caad.fkie.fraunhofer.de\/details\/win.icedid\" target=\"_blank\" rel=\"noreferrer noopener\">IcedID<\/a>&nbsp;main module. It can intercept web traffic on the victim machine.<\/li><\/ul><\/li><\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Other<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>mexecDll<ul><li>General purpose \u201cdownload and execute\u201d module.<\/li><\/ul><\/li><\/ul>\n\n\n\n<figure id=\"tablepress-884\" class=\"wp-block-table\"><table><thead><tr><th>Module names<\/th><th>Sub-config<\/th><th>Rich headers<\/th><\/tr><\/thead><tbody><tr><td>shareDll, mshareDll, tshareDll<\/td><td><\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>wormwinDll, wormDll, mwormDll, nwormDll<\/td><td><\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>tabDll<\/td><td>dpost<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>pwgrab<\/td><td>dpost<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>systeminfo<\/td><td><\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>domainDll<\/td><td><\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>networkDll<\/td><td>dpost<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>outlookDll<\/td><td><\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>importDll<\/td><td><\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>mailsearcher<\/td><td>mailconf<\/td><td><strong>NO<\/strong><\/td><\/tr><tr><td>cookiesDll<\/td><td>dpost<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>squlDll<\/td><td><\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>aDll<\/td><td><\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>psfin<\/td><td>dpost<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>injectDll<\/td><td>dinj, sinj, dpost<\/td><td><strong>YES<\/strong>\/<strong>NO<\/strong><\/td><\/tr><tr><td>NewBCtestDll, NewBCtestnDll<\/td><td>bcconfig3<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>vncDll<\/td><td>vncconf<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>vpnDll<\/td><td>vpnsrv<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>rdpscanDll<\/td><td>srv<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>bcClientDllTestTest<\/td><td><\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>shadnewDll<\/td><td>dom<\/td><td><strong>YES<\/strong><\/td><\/tr><tr><td>mexecDll<\/td><td><\/td><td><strong>YES<\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><em>Useful links:<\/em><\/h3>\n\n\n\n<p>Microsoft blog post:&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/nam06.safelinks.protection.outlook.com\/?url=https%3A%2F%2Fblogs.microsoft.com%2Fon-the-issues%2F%3Fp%3D64132&amp;data=04%7C01%7CKatie.Zoller%40microsoft.com%7Ccd197b3ae6cc4539c5b408d86c75c389%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637378600788394463%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=p0cm0R1%2Fv2ag4qI%2BbbhHlsSIkXMIdYF0rFQURABEm5A%3D&amp;reserved=0\" target=\"_blank\">https:\/\/blogs.microsoft.com\/on-the-issues\/?p=64132<\/a><\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2020\/10\/12\/eset-takes-part-global-operation-disrupt-trickbot\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ESET has collaborated with partners Microsoft, Lumen\u2019s Black Lotus Labs, NTT Ltd. and others in an attempt to disrupt Trickbot botnets. ESET contributed to the project by providing technical analysis, statistical information, and known command and control server domain names and IPs. Trickbot has infected over a million computing devices around the world since late<\/p>\n","protected":false},"author":5,"featured_media":5222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[145],"tags":[],"class_list":["post-5221","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-botnet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ESET takes part in global operation to disrupt Trickbot - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ESET takes part in global operation to disrupt Trickbot\" \/>\n<meta property=\"og:description\" content=\"ESET has collaborated with partners Microsoft, Lumen\u2019s Black Lotus Labs, NTT Ltd. and others in an attempt to disrupt Trickbot botnets. ESET contributed to the project by providing technical analysis, statistical information, and known command and control server domain names and IPs. Trickbot has infected over a million computing devices around the world since late\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-13T08:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-13T15:00:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"ESET takes part in global operation to disrupt Trickbot\",\"datePublished\":\"2020-10-13T08:00:58+00:00\",\"dateModified\":\"2020-10-13T15:00:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/\"},\"wordCount\":2741,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/eset-botnet-trickbot-global-operation-disrupt.jpg\",\"articleSection\":[\"botnet\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/\",\"name\":\"ESET takes part in global operation to disrupt Trickbot - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/eset-botnet-trickbot-global-operation-disrupt.jpg\",\"datePublished\":\"2020-10-13T08:00:58+00:00\",\"dateModified\":\"2020-10-13T15:00:27+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/eset-botnet-trickbot-global-operation-disrupt.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/eset-botnet-trickbot-global-operation-disrupt.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ESET takes part in global operation to disrupt Trickbot\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2020\\\/10\\\/13\\\/eset-takes-part-in-global-operation-to-disrupt-trickbot\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ESET takes part in global operation to disrupt Trickbot - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/","og_locale":"en_US","og_type":"article","og_title":"ESET takes part in global operation to disrupt Trickbot","og_description":"ESET has collaborated with partners Microsoft, Lumen\u2019s Black Lotus Labs, NTT Ltd. and others in an attempt to disrupt Trickbot botnets. ESET contributed to the project by providing technical analysis, statistical information, and known command and control server domain names and IPs. Trickbot has infected over a million computing devices around the world since late","og_url":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2020-10-13T08:00:58+00:00","article_modified_time":"2020-10-13T15:00:27+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"ESET takes part in global operation to disrupt Trickbot","datePublished":"2020-10-13T08:00:58+00:00","dateModified":"2020-10-13T15:00:27+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/"},"wordCount":2741,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg","articleSection":["botnet"],"inLanguage":"en-US","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/","url":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/","name":"ESET takes part in global operation to disrupt Trickbot - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg","datePublished":"2020-10-13T08:00:58+00:00","dateModified":"2020-10-13T15:00:27+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2020\/10\/eset-botnet-trickbot-global-operation-disrupt.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"ESET takes part in global operation to disrupt Trickbot"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2020\/10\/13\/eset-takes-part-in-global-operation-to-disrupt-trickbot\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5221","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=5221"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/5221\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/5222"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=5221"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=5221"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=5221"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}