Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0266

TrickBot

Type

Banking Trojan and malware dropper

Associated threat actors

Wizard Spider, Conti

Key Capabilities

Achieves financial gain by stealing banking credentials and personal information. It has a modular structure, logs keystrokes, and delivers other malware.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is TrickBot?

TrickBot (S0266) is a sophisticated, modular banking trojan used for financial fraud. First seen in 2016, it has since evolved into a versatile malware dropper.

While it still steals financial data, TrickBot is now a major delivery vehicle for other malware, including Conti ransomware. Its modular structure, with a core component that can be updated with different plugins or modules, allows its operators, like Wizard Spider, to constantly update its capabilities. This makes it a persistent and dangerous threat.

How to Defend Against TrickBot?

Defending against TrickBot requires a focus on preventing its initial delivery and detecting its network activity.

  • Educate users to recognize and report phishing attempts, the primary delivery vector for TrickBot.
  • Keep all software and systems patched to limit the vulnerabilities that can be exploited for initial access.
  • Deploy reliable antivirus and endpoint security solutions to identify and block the trojan’s execution and its malicious modules.
  • Use network detection (NDR) with integrated threat intelligence to spot and block C2 communications associated with TrickBot.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.