Sunday, October 17, 2021

Trickbot Malware Comeback using the new VNC module

Must Read

Hackers demand ransom after a cyber attack on the laboratory in Antwerp

Hoboken's medical laboratory, Het Algemeen Medisch Laboratorium (AML), was the victim of a cyber attack on Monday. The hackers...

Critical bug found in Cortex XSOAR Allows Remote ‘War Room’ Access

A critical vulnerability in Palo Alto Networks, Cortex XSOAR system could have allowed an attacker to perform a command...

Hackers hide web skimmer inside a website’s CSS files

Formerly, security researchers discovered internet skimmers (Magecart broadcasts ) within favicons, website logos, live chat rooms, and, most recently,...

On Monday Cybersecurity firm Bitdefender Published a Blog Post on Trickbot Malware that using the new VNC module to Spy on its Victims.

Trickbot Malware has discovered an updated VNC module that seems to be in active development, as its maintainers are updating it at a very fast pace.

This module is now delivered under a new name, observations also helped to map the attackers’ network architecture

Researchers have identified the software application that the attackers use to connect to victims’ computers. This tool is called VNCView.

In addition to upgraded modules, Bitdefender has noted a significant increase in command-and-control centers deployed around the world.

Trickbot Malware Comeback using the new VNC module

This new research focuses on an updated VNC module, which includes new functionalities for monitoring and intelligence gathering.

Now according to Bitdefender, the threat actor has been found actively developing an updated version of a module called “vncDll” that it employs against select high-profile targets for monitoring and intelligence gathering. The new version has been named “tvncDll.”

a2434345d63481a40f0d145881b41013?s=96&d=mm&r=g
Priyanshu Vijayvargiya
Founder and Editor-in-Chief of 'Virtualattacks Inc' Priyanshu Vijayvargiya is a cybersecurity analyst, Information Security professional, developer, and a white hat hacker.

Leave a reply

Please enter your comment!
Please enter your name here

Latest News

Unified endpoint management automation software to boost endpoint security

Endpoints are constantly connected to the internet, so they offer a gateway for cyberattacks. Endpoint security is simply the process...

Attackers Using Morse Code in phishing campaign to Evade Detection

Microsoft on Thursday revealed the techniques used by attackers to avoid detection using morse code in the phishing campaign.Microsoft also revealed the workings of...

Murata Manufacturing suffers data breach of employees and customer

Japanese electronic components manufacturer Murata has released an apology Notice for the data breach of thousands of files in June that contained bank account...

Everything about Signalling System 7(SS7)

Signaling System 7 (SS7) is an international telecommunication protocol standard that controls and regulates the network elements in a public switched telephone network (PSTN)....

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails...

More Articles Like This