According to U.S. government cybersecurity experts, Ryuk ransomware and Trickbot operators are targeting U.S. hospitals and healthcare providers.
Microsoft has worked with telecommunications providers worldwide to take down TrickBot malware infrastructure. TrickBot traces its roots back to 2016 as a modular banking trojan designed to steal information and distribute other malware to infected systems.
Security firm Bitdefender published its mid-year Threat Landscape Report 2020 that reveals how cybersecurity threats and malware play on the pandemic theme.
Security experts from Check Point Research have observed a sharp increase in Emotet botnet activity used to spread spam campaigns and steal banking credentials.
TrickBot recently replaced one of its propagation modules "mworm" with new module named "nworm." The updated module can exploit vulnerable domain controllers (DCs) and evade detection by running in memory.
The Australian Signals Directorate’s Australian Cyber Security Centre (ACSC) has warned of an ongoing and widespread phishing campaign designed to spread Emotet malware throughout Australia.
Cyber criminals have been actively pushing Emotet malware since early November.
Trend Micro released two new reports on malware threats named Trickbot and Shellbot.
A new banking trojan campaign is using Trickbot to redirect users to a fake website, claiming to be Lloyds Bank that displays the correct URL and has a valid SSL certificate.