TrickBot Malware Learns How to Spam -- Ensnares 250M Email Addresses
upstart writes in with a submission, via IRC, for SoyCow7671:
TrickBot malware learns how to spam, ensnares 250M email addresses
Old bot, new tricks.
TrickBot, a financially motivated malware in wide circulation, has been observed infecting victims' computers to steal email passwords and address books to spread malicious emails from their compromised email accounts.
The TrickBot malware was first spotted in 2016 but has since developed new capabilities and techniques to spread and invade computers in an effort to grab passwords and credentials - eventually with an eye on stealing money. It's highly adaptable and modular, allowing its creators to add in new components. In the past few months it's adapted for tax season to try to steal tax documents for making fraudulent returns. More recently the malware gained cookie stealing capabilities, allowing attackers to log in as their victims without needing their passwords.
With these new spamming capabilities, the malware - which researchers are calling "TrickBooster" - sends malicious [e-mail] from a victim's account then removes the sent messages from both the outbox and the sent items folders to avoid detection.
Researchers at cybersecurity firm Deep Instinct, who found the servers running the malware spamming campaign, say they have evidence that the malware has collected more than 250 million email addresses to date. Aside from the massive amounts of Gmail, Yahoo, and Hotmail accounts, the researchers say several U.S. government departments and other foreign governments - like the U.K. and Canada - had emails and credentials collected by the malware.
[...] The researchers described TrickBooster as a "powerful addition to TrickBot's vast arsenal of tools," given its ability to move stealthily and evade detection by most antimalware vendors, they said.
Read more of this story at SoylentNews.