Fact-checked by Grok 2 weeks ago

Trickbot

Trickbot is a modular banking targeting Windows systems, initially detected in 2016 and designed for credential theft via phishing-delivered payloads that enable injection attacks on . Over time, it evolved into a versatile, multi-phase platform capable of installing persistent backdoors, harvesting system information for , executing lateral movement within networks, and downloading secondary such as variants including Ryuk and Conti. Deployed by organized actors through mass email campaigns often masquerading as legitimate invoices or updates, Trickbot has infected over a million devices worldwide, targeting sectors from healthcare to and generating for operators via credential , malware leasing, and facilitation. Notable disruptions include a 2020 international operation led by , in coordination with U.S. Cyber Command and partners, which neutralized numerous command-and-control servers, though operators quickly adapted by deploying new infrastructure and variants to restore functionality. Subsequent actions in 2024 against associated droppers like Smokeloader and further targeted its distribution ecosystem, underscoring Trickbot's role as a resilient enabler in the economy despite repeated law enforcement interventions.

History

Origins and Initial Deployment ()

TrickBot emerged in as a modular banking developed by an organized group, primarily targeting the theft of financial credentials and data from infected systems. The malware was first observed in the wild during that year, exhibiting structural and operational similarities to earlier credential-stealing Trojans such as Dyre (also known as Dyreza), including communication with command-and-control (C2) servers for . Initially designed for financially motivated attacks, TrickBot focused on intercepting banking-related inputs via form-grabbing techniques and keylogging, enabling operators to harvest login details for unauthorized access to online accounts. Initial deployments relied on campaigns, often delivered through malspam emails containing malicious links or attachments that prompted users to enable macros in documents, thereby installing the TrickBot . These emails typically masqueraded as legitimate communications to lure victims into executing the payload, which then established on Windows systems and beaconed to infrastructure for further instructions. The 's early variants demonstrated basic modularity, allowing for credential theft modules tailored to specific banking institutions, though it lacked the advanced lateral movement or capabilities seen in later iterations. By late 2016, TrickBot had begun targeting users in and , capitalizing on its evasion tactics like process injection to avoid detection by contemporary . The actors behind TrickBot operated as a resilient group, using underground forums for distribution and monetization, with initial infections serving as entry points for direct financial rather than broader network compromise. No public attribution to specific individuals occurred at the time, but the malware's code quality and rapid updates indicated professional development by actors likely based in . This foundational phase established TrickBot as a persistent , with early campaigns demonstrating its adaptability to regional banking targets through customizable modules.

Modular Evolution and Growth (2017-2019)

During 2017, Trickbot transitioned from a primarily banking-focused trojan to a more versatile modular platform by incorporating a worm module for lateral movement across networks, drawing inspiration from exploits like those in WannaCry. This enabled automated propagation via SMB vulnerabilities, while new capabilities targeted Outlook credentials to facilitate email-based spreading, potentially compromising millions of corporate accounts. Data exfiltration expanded to include browser cookies, history, visited URLs, and Adobe Flash Local Shared Objects, enhancing credential theft beyond financial institutions. On April 20, 2017, developers added the bcClientDll32 module, providing reverse proxy functionality via SOCKS5 for remote access and tunneling. In 2018, Trickbot's modular architecture saw further refinements, including a PowerShell-based module to disable Windows Defender, improving evasion against . Code obfuscation techniques were integrated to hinder and detection by antivirus tools. The malware's attack volume surged, accounting for 12.85% of unique banking incidents globally, with operations targeting in 65 countries—expanding to 11 new nations that year, including heavy focus on the (11.02%), (9.34%), and (7.99%). On , 2018, the domainDll32 module was introduced to enumerate domain controllers and gather intelligence, aiding deeper network reconnaissance. By year's end, Trickbot overtook as a leading threat to businesses, reflecting its operators' emphasis on scalability and multi-vector delivery. By 2019, updates emphasized stealth and targeted expansion; early in the year, the injectDll32 module was enhanced to hook Windows networking APIs alongside traditional web injections for banking sites. Web injection templates were updated to phish credentials from US mobile carriers like Sprint, Verizon, and T-Mobile. The Mworm propagation module was replaced with Nworm, which operated in memory to avoid disk artifacts and manipulated HTTP traffic for better evasion. On October 8, 2019, the anubisDll32 module debuted, incorporating man-in-the-browser attacks with ties to IcedID banking trojan elements and VNC remote control. EternalBlue exploits were integrated for worm-like spreading, contributing to compromises of over 250 million email accounts by mid-year. These enhancements solidified Trickbot's role as a flexible downloader for secondary payloads, driving its growth into a multi-stage infection toolkit.

Ransomware Integration and Peak Activity (2020-2021)

In 2020, Trickbot operators expanded its modular architecture to serve as an initial access vector for deployments, particularly Ryuk, by incorporating capabilities for network reconnaissance, theft via tools like , and lateral movement over protocols. These enhancements allowed infected systems to enumerate domains, harvest administrator , and exfiltrate data to command-and-control servers, paving the way for subsequent payloads. Trickbot's role shifted from primary banking functions to a versatile dropper, often following initial infections via or emails containing malicious Office macros or . Ryuk ransomware integrations peaked in mid-2020, with Trickbot facilitating targeted attacks on enterprises, including healthcare providers, amid heightened cybercrime activity during the COVID-19 pandemic. For instance, campaigns in June 2020 exploited current events like COVID-19 and social movements for phishing lures, leading to widespread Trickbot infections that enabled Ryuk encryption and ransom demands averaging millions of dollars per victim. By October 2020, Trickbot and associated trojans like Emotet were linked to a documented spike in ransomware incidents, with cybersecurity firms reporting Trickbot as a key enabler in human-operated attacks on critical infrastructure. A coordinated disruption effort on October 12, 2020, by Microsoft, ESET, and other firms neutralized much of Trickbot's command-and-control infrastructure, reducing active botnet nodes by over 90% initially. However, operators quickly rebuilt variants, sustaining high activity into 2021, where Trickbot ranked as the most prevalent malware in global detections for months including June and September. In this period, Trickbot also supported Conti ransomware initial access, contributing to nearly 450 reported global Conti attacks, many targeting U.S. critical infrastructure. This resurgence underscored Trickbot's adaptability, with modules updated for evasion and persistence, such as UEFI/BIOS enumeration for deeper system control.

Disruptions and Partial Takedowns (2021-2022)

In early , Trickbot demonstrated resilience following the partial infrastructure disruptions of 2020, surging in prevalence as it capitalized on the takedown of rival botnets like in 2021. firms reported Trickbot impacting approximately 3% of global organizations in February 2021, with aggressive distribution via malicious campaigns targeting sectors such as legal and . By September and 2021, it topped rankings, affecting up to 11% of corporate networks in some analyses, often serving as a dropper for payloads. Activity began waning in late 2021, with no new command-and-control (C2) servers registered after December 16, 2021, signaling operational shifts by the Russia-based Wizard Spider group. Operators increasingly abandoned Trickbot for alternatives like Emotet and BazarBackdoor, migrating controlled infected devices to these platforms due to Trickbot's high detection rates, recognizable network traffic, and reduced efficiency for targeted intrusions. This internal pivot, rather than a comprehensive external takedown, marked a partial dismantling, as core developers and penetration testers were recruited by the Conti ransomware syndicate to bolster its capabilities, including Active Directory exploits. On February 24, 2022, Trickbot's infrastructure was formally shuttered, ending over five years of operation that had involved investments exceeding $20 million. The shutdown followed months of inactivity, with operators redirecting efforts to stealthier malware families; new servers appeared as early as February 19, 2022, and BazarBackdoor infrastructure activated shortly thereafter. While this effectively neutralized Trickbot's global footprint, remnants persisted through Conti integrations, and U.S. Department of indictments in 2023 referenced the 2022 takedown as a key milestone in curbing its ransomware-enabling role. No full recovery occurred, contrasting with post-2020 rebounds, as threat actors prioritized evasion over maintaining the aging platform.

Technical Architecture

Core Design and Components

Trickbot employs a modular architecture centered on a persistent loader component that serves as the foundational element for downloading, decrypting, and executing specialized DLL modules from command-and-control () servers. The loader, typically a 32-bit or 64-bit executable or DLL delivered via initial vectors, establishes persistence by copying itself to directories such as %AppData%[Roaming](/page/Roaming) and , and scheduling tasks like "SpeedNetworkTest" to ensure regular execution. This design, implemented primarily in C++, enables dynamic adaptability, where the loader handles core functions like communication over to hardcoded addresses and ports (e.g., 185.20.184.74:8082 or 103.119.144.250:8082), using GET requests formatted with bot identifiers and group tags (gtag) to fetch encrypted modules. Upon initialization, the loader decrypts modules using a system-generated botkey derived from machine-specific , such as identifiers, and loads them into memory via techniques like to evade static detection. Modules are stored in a dedicated "Data" folder post-decryption and executed based on directives, supporting both static and dynamic configurations for flexibility across Windows environments. This core loader also incorporates evasion primitives, including disabling Windows Defender via registry modifications and process hollowing to mask malicious activities. Essential components include the anchor module for primary orchestration and signaling, the inject DLL (e.g., injectDll64.dll or injectDll32.dll) for browser APIs like ws2_32::connect() and certificate validation functions to facilitate man-in-the-browser attacks, and reconnaissance modules such as systeminfo64.dll for enumerating system details like browser from registry keys (e.g., IntelliFormsStorage2). Additional core elements encompass persistence mechanisms and a worm-like propagation framework exploiting vulnerabilities for lateral movement, underscoring the design's emphasis on extensibility over monolithic functionality.

Modular Structure and Updates

TrickBot's architecture is built around a modular featuring a persistent loader component that fetches and injects (DLL) modules from command-and-control () servers over connections. These modules, often encrypted with in mode using 256-bit keys and obfuscated via custom packers, handle discrete tasks such as credential harvesting, web injection, and network propagation, allowing the to function as a versatile platform rather than a monolithic . The loader establishes persistence through scheduled tasks triggering every 11 minutes and stores modules in directories like %AppData%\Roaming. Updates occur dynamically via directives, where the polls for configuration files, new modules, or Base64-encoded commands, including fallback channels for against disruptions. This command-driven model enables rapid iteration, with modules downloaded on demand—such as through command "5" for injection into processes like [svchost.exe](/page/Svchost.exe) using process hollowing techniques—and reported back via HTTP POST requests. Operators leverage this to evade detection by incorporating anti-analysis measures like encrypted strings, dynamic resolution, and delays (e.g., 3000ms post-infection). Early enhancements in 2017 introduced modules like the worm-like mwormDll64 for lateral movement via and LDAP, alongside an credential stealer targeting corporate email accounts. In October 2018, the pwgrab was deployed to extract autofill data, history, and credentials from (e.g., Chrome's "Login Data.bak") and tools like , using threaded operations and reporting to specific IPs. By September 2019, payloads incorporated importDll64 for data theft and injectDll64 for site-specific web injections targeting over 25,000 domains with wildcard support, plus encryption and Windows Defender disablement via . Later modules expanded reconnaissance, including / enumeration for persistence attempts, and supported cryptomining or payloads. This iterative modularization, with samples recompiled frequently (e.g., 2019-09-16 builds), sustained TrickBot's adaptability until infrastructure takedowns in 2021-2022 curtailed major updates.

Capabilities

Credential Theft and Banking Functions

TrickBot originated in as a banking specifically engineered to harvest financial credentials, succeeding the Dyre and targeting users' banking information through sophisticated injection techniques. Its core banking functionality revolves around person-in-the-browser attacks, where it employs web injects to overlay malicious content on legitimate banking websites, capturing usernames, passwords, and other sensitive data entered by victims. These injects often leverage browser redirection and server-side modifications to create fake login pages or alter form fields, facilitating credential theft without alerting the user. The malware's modular architecture includes dedicated components for credential access, such as the injectDll module, which serves as the primary banker payload responsible for browser injections and exfiltrating financial data to command-and-control servers. Complementing this, the pwgrab module systematically extracts stored credentials from web browsers—including Chrome, Firefox, and Internet Explorer—along with autofill data, form histories, and cookies, broadening the scope beyond real-time captures to include previously saved banking details. Additional modules like outlookDll target email credentials, which operators use to enable further phishing or account compromises tied to financial services, while psfin focuses on point-of-sale software to steal transaction-related credentials. Credential theft extends to system-level techniques, including hooking via functions like CredEnumerateA to intercept logins and queries against Windows Credential Manager or for stored passwords. TrickBot also scans registry keys and unsecured files for credentials from applications such as or , which may contain saved banking or remote access details relevant to financial operations. These harvested credentials enable downstream activities like wire fraud, unauthorized transfers, and account takeovers, with exfiltrated data often sold on underground markets or used directly by affiliated actors. The modular updates, observed as early as , allow rapid adaptation of injection scripts to evade detection by specific banks, ensuring sustained efficacy in credential theft campaigns.

System Reconnaissance and Lateral Movement

TrickBot employs modular plugins to conduct extensive , enabling operators to profile infected hosts and networks for subsequent . Upon , it gathers detailed information, including operating system version, CPU , RAM capacity, machine hostname, and / details, often via APIs like WMI or direct registry queries. The also enumerates running processes, installed services, user accounts, and local groups to assess privileges and potential opportunities. A key component for network-oriented reconnaissance is the networkDLL plugin, introduced around 2018, which executes Windows commands such as ipconfig /all for TCP/IP configuration, net config workstation for domain or workgroup details, net view /all for accessible shares, and nltest /domain_trusts /all_trusts for enumerating trusted domains. This module further leverages Active Directory interfaces like IADsADSystemInfo to retrieve domain DNS names, site names, and forest details, while querying LDAP for domain controllers, user accounts (e.g., sAMAccountName), and host attributes (e.g., dNSHostname). Additional modules, such as shareDLL or mshareDLL, discover network shares using APIs like WNetOpenEnumA, facilitating mapping of accessible resources. The masrvDLL incorporates tools like Masscan to scan and enumerate remote systems, identifying live hosts and open ports for targeted propagation. For lateral movement, TrickBot exploits stolen credentials and vulnerabilities to propagate within networks, often prioritizing SMB-dependent environments. It abuses the (SMB) through worm-like modules such as WormDLL and ShareDLL, which scan for vulnerable shares and attempt connections using harvested passwords or brute-force lists derived from prior credential theft. The TabDLL module deploys exploits like EternalRomance (CVE-2017-0147) over SMBv1 to execute payloads remotely without authentication. Complementing these, the rdpScanDLL brute-forces (RDP) credentials to enable logon and payload deployment on adjacent systems. For sustained access, modules like vncDLL establish (VNC) sessions, allowing remote control and pivoting to high-value targets. The SqulDLL enhances movement by enabling WDigest authentication and dumping credentials via Mimikatz-like functionality for reuse in lateral propagation. These techniques, observed consistently from 2018 onward, prioritize efficiency in enterprise networks, often combining reconnaissance data to select paths minimizing detection risk.

Payload Delivery and Ransomware Deployment

TrickBot employs a modular loader that communicates with command-and-control (C2) servers over HTTPS to download configuration files and additional modules, enabling the dynamic delivery of secondary payloads tailored to specific objectives. These modules, such as pwgrab for credential harvesting and injectDll for process injection, are decrypted at runtime and executed to expand capabilities, including the injection of payloads into legitimate processes like svchost.exe for evasion. The core design facilitates payload persistence through scheduled tasks and registry modifications, allowing subsequent downloads of tools like Cobalt Strike beacons for further exploitation. In ransomware deployment scenarios, serves as an initial access vector and platform rather than a direct dropper, with human-operated actors leveraging its foothold for manual escalation. Following , modules like dll.dll execute system commands (e.g., ipconfig, net, nltest) and deploy PowerShell-based tools such as for port scanning and asset discovery, identifying high-value targets like domain controllers. Lateral movement occurs via propagation, credential dumping with , and exploits like , often after disabling defenses such as Windows Defender. This reconnaissance phase transitions to ransomware execution, as observed in campaigns linking TrickBot to since at least December 2018, where operators use RDP, PsExec, or batch scripts to deploy the encryptor on critical systems after dwell periods ranging from days to over a year. For instance, in tracked operations attributed to groups like TEMP.MixMaster, TrickBot's network propagation modules (e.g., sharedll, tabdll) spread to dozens to hundreds of hosts, enabling before Ryuk encryption, which has yielded millions in ransoms. Similar patterns extend to other variants, including Conti and , facilitated by TrickBot's C2-directed exfiltration and module synchronization.

Infection Vectors

Phishing and Social Engineering Campaigns

Trickbot primarily propagates through campaigns that leverage social engineering to deceive users into executing malicious payloads. These campaigns typically involve spearphishing emails with tailored lures, such as fraudulent business documents or urgent notifications, containing attachments like files exploiting VBA macros or hyperlinks directing to drive-by downloads. Once opened, users are often prompted via social engineering prompts—such as claims of required updates or upgrades—to enable content or macros, thereby initiating the infection chain. Notable campaigns have exploited timely events for relevance. In December 2019, operators distributed Trickbot via emails mimicking payroll updates, using subject lines like "Payroll Update" to entice recipients into opening infected Excel attachments. By March 2020, amid the outbreak, a campaign targeted Italian users with emails referencing fears, embedding malicious links or attachments disguised as health-related alerts to bypass awareness and drive infections. In September 2020, another stealthy operation employed droppers in emails to evade detection, focusing on broad rather than hyper-targeted spearphishing. Social engineering elements extend beyond initial lures to post-infection persistence, where Trickbot modules harvest credentials via form-grabbing or keylogging, often amplifying impact through lateral movement enabled by stolen access. While Trickbot infections have historically overlapped with distributors like , direct remains a core vector, with campaigns adapting to evade filters through obfuscated payloads and polymorphic attachments. These tactics underscore the malware's reliance on over zero-day exploits, contributing to its widespread adoption in ecosystems.

Exploit Kits and Malvertising

TrickBot has utilized exploit kits, automated toolsets that probe for unpatched vulnerabilities in browsers and plugins to deliver payloads without user interaction, as one of its infection vectors since its emergence in mid-2016. Notably, early campaigns leveraged the RIG exploit kit to facilitate drive-by downloads, targeting vulnerabilities in software such as and to install the initial TrickBot loader on victim systems. This method allowed operators to compromise users visiting legitimate websites compromised by injected malicious code, bypassing the need for direct in some instances. Malvertising campaigns have further amplified TrickBot's reach by embedding malicious advertisements on ad networks or legitimate sites, redirecting users to exploit kit landing pages upon interaction or even passively. These ads often masquerade as benign promotions, exploiting trusted platforms to evade initial detection and exploit browser-based flaws for delivery. While less prevalent than email-based , such vectors enabled scalable infections, with RIG EK specifically noted in TrickBot distributions through as early as 2016. Cybersecurity analyses indicate that exploit kit deliveries of TrickBot were rarer compared to spam attachments but effective against outdated systems, contributing to the malware's modular evolution by providing alternative entry points for subsequent modules like credential stealers. Operators have periodically shifted tactics to counter exploit kit takedowns, such as the decline of RIG EK activity post-2018, reducing reliance on these methods in favor of social engineering; however, residual persists in hybrid campaigns. Defensive measures, including timely patching of vulnerabilities like those in or (e.g., CVE-2016-0189 exploited in related kits), have mitigated many such attacks, though unpatched enterprise environments remain susceptible.

Impact and Operations

Scale of Infections and Victim Targeting

TrickBot, operational since , has achieved widespread infections, with cybersecurity analyses estimating over 140,000 systems compromised globally in the 10 months following its major botnet disruption in October 2021, spanning 149 countries and encompassing both individual users and organizations. Earlier campaigns, particularly in 2020, positioned TrickBot among the most prevalent variants, driving spikes in detections as operators expanded distribution via and exploit kits. Victim targeting initially focused on financial institutions and users in regions with high banking activity, such as the , , and , to facilitate credential theft through web injections tailored to specific banks and payment systems. Over time, the malware's enabled broader enterprise infiltration, affecting customers of at least 60 major firms in finance, technology, and sectors since 2020, including entities like , , and . Beyond finance, TrickBot operators systematically targeted healthcare providers, exploiting vulnerabilities during the , as internal communications revealed gloating over attacks on hospitals perceived as "easy targets." Industrial organizations and also faced and lateral movement, often serving as precursors to payloads like Conti, which linked TrickBot infections to over 1,800 victims across 71 countries by late 2021. Recent activity has included intensified efforts against entities amid geopolitical tensions. This opportunistic expansion reflects a shift from pure banking trojan operations to a versatile platform prioritizing high-value and access sales within networks.

Economic and Data Loss Consequences

Trickbot's credential theft modules targeted banking information, email accounts, and browser data, enabling that inflicted direct financial harm on individuals and institutions. As a banking , it facilitated unauthorized transactions and account takeovers, contributing to substantial losses for financial entities through fraudulent activities. The malware's role as an initial access vector amplified economic damage by paving the way for ransomware deployments, such as and , which encrypted systems and demanded payments while threatening data leaks. Victims, including hospitals, schools, and businesses among millions infected worldwide, collectively endured tens of millions of dollars in losses from , demands, recovery efforts, and operational disruptions. Data losses stemmed from Trickbot's exfiltration of sensitive credentials and data, which operators used for further or sold on underground markets, exacerbating and secondary breaches. In ransomware scenarios linked to Trickbot, attackers often exfiltrated terabytes of corporate data prior to , leading to long-term risks like regulatory fines and reputational harm for affected organizations. TrickBot serves as a foundational component in the group's operations, a Russia-based that leverages the for initial network compromise and lateral movement, often transitioning to deployment. This group, active since at least 2016, has integrated TrickBot into a modular that supports harvesting and , positioning it as an initial access broker within ransomware-as-a-service models. Wizard Spider actors have frequently used TrickBot to deliver ransomware payloads, including Ryuk and Conti, with documented campaigns where TrickBot infections preceded Ryuk encryption as early as 2019. Analysis of blockchain transactions and operational overlaps corroborates ties between Wizard Spider, Ryuk, and Conti operators, revealing shared infrastructure such as command-and-control servers and cryptocurrency wallets used for ransom payments exceeding millions of dollars. U.S. Department of Justice indictments in September 2023 charged multiple foreign nationals with roles in both TrickBot distribution and Conti ransomware attacks, highlighting direct personnel and financial interconnections; these individuals allegedly facilitated Conti infections affecting critical infrastructure in 2021. TrickBot's ecosystem extends to collaborations with Emotet malware distributors, where Emotet campaigns dropped TrickBot modules to steal data and enable Ryuk propagation, amplifying infection scales across enterprise targets. The group's activities align with broader Russian-speaking cybercrime networks, including elements of the Maze Cartel, through shared tactics like and exploit kits for initial vectoring, as well as infrastructure reuse for management. Leaked from 2022 exposed TrickBot operators coordinating with affiliates on target selection and evasion techniques, underscoring a commercialized model where access sales fund ongoing development. U.S. sanctions in 2023 further noted TrickBot's ties to services, complicating attribution but confirming its embedded role in state-adjacent criminal enterprises.

Law Enforcement Actions

Coordinated Disruption Efforts

In October 2020, Microsoft's Digital Crimes Unit (DCU), in coordination with partners including the Financial Services Information Sharing and Analysis Center (FS-ISAC), Health-ISAC, and global telecommunications providers such as and Akamai, executed a civil legal action to disrupt Trickbot's command-and-control () infrastructure. This effort involved analyzing over 186,000 Trickbot samples to identify and seize control of domains critical to the 's operations, thereby preventing operators from distributing the or activating associated payloads, including loaders like Ryuk. Concurrently, the U.S. Cyber Command conducted offensive cyber operations over three weeks to further degrade Trickbot's capabilities, targeting its modular update mechanisms and hindering resilience. These actions collectively aimed to interrupt the 's role as a precursor to attacks, though operators demonstrated partial recovery through redundant infrastructure. Subsequent international efforts under Operation Endgame, coordinated by and , extended disruptions to Trickbot as part of broader actions against dropper ecosystems. In May 2024, law enforcement from , , the , and supporting nations including the U.S., , and , dismantled over 100 servers and seized more than 2,000 domains linked to droppers such as Trickbot, IcedID, and others, resulting in four arrests in and . This phase focused on initial infection vectors, severing pathways to deployment across jurisdictions in , , and beyond. A follow-up phase of Operation Endgame from May 19–22, 2025, intensified targeting of initial access including , with agencies from , , , , the , , and the U.S. taking down 300 servers and neutralizing 650 domains worldwide. The operation, supported by 's European Cybercrime Centre, issued international arrest warrants for 20 key actors, added 18 suspects to the EU Most Wanted list, and seized €3.5 million in (contributing to a total of €21.2 million across Endgame phases), aiming to break kill chains at their source. These coordinated takedowns highlighted improved cross-border intelligence sharing but underscored ongoing challenges from malware modularity and operator adaptations.

Arrests, Charges, and Sentencings

In June 2021, Latvian national Alla Witte was indicted in the United States for her role as a in the Trickbot operation, where she developed code to deploy and collect extortion payments from infected systems. Witte pleaded guilty to conspiracy to commit and, in June 2023, was sentenced to 32 months in , marking one of the first convictions related to Trickbot development. Russian national Dunaev was extradited from the Republic of Korea to the in 2021 following his for contributing to Trickbot's codebase, including tools for credential harvesting, remote access enhancement, and evasion of security software that facilitated infections of millions of computers worldwide. Dunaev pleaded guilty on November 30, 2023, to to commit and , as well as to commit wire fraud and ; he was sentenced on January 25, 2024, in the U.S. District Court for the Northern District of to five years and four months in prison. On September 7, 2023, the U.S. Department of Justice unsealed indictments charging nine Russian nationals—Maksim Galochkin, Maksim Rudenskiy, Mikhail Mikhailovich Tsarev, Andrey Yuryevich Zhuykov, Dmitry Putilin, Sergey Loguntsov, Max Mikhaylov, Valentin Karyagin, and Maksim Khaliullin—with conspiracies tied to Trickbot malware deployment and its use as a precursor for Conti ransomware attacks, including against critical infrastructure like hospitals. These individuals, alleged to have served as developers, managers, system administrators, and operators responsible for infecting over 900 victims globally, each face maximum penalties of up to 62 years in prison if convicted, though none have been arrested or extradited as of October 2025, likely due to their location in Russia. In July 2024, authorities arrested 37-year-old in , identifying him as a Trickbot developer involved in the group's operations; however, details on subsequent charges or efforts remain limited, with the detention reportedly linked to broader investigations by Russian investigators.

Sanctions and Attribution Challenges

In February 2023, the U.S. Department of the Treasury's (OFAC), coordinated with the United Kingdom's Office of Financial Sanctions Implementation (OFSI), designated seven individuals linked to the Russia-based Trickbot group for their roles in development, operations, and financial fraud targeting such as hospitals and U.S./U.K. businesses. Key sanctioned figures included Vitaly Kovalev (aliases "Bentley" or "Ben"), a senior operator charged with ; Maksim Mikhailov ("Baget"), involved in development; and Valentin Karyagin ("Globus"), focused on modules. These measures sought to freeze assets and prohibit dealings, citing Trickbot's alignment with intelligence objectives while exploiting global financial systems. An additional wave of sanctions in September 2023 targeted eleven more actors, including administrators like Andrey Zhuykov, testers' lead Maksim Galochkin, and coders such as Sergey Loguntsov, who managed procurement, , and malicious . The designations highlighted Trickbot's role in cyberattacks on U.S. entities, corporations, and healthcare providers amid the crisis, with operators providing technical support to affiliates. Both sanction rounds emphasized Russia's function as a for cybercriminals, where jurisdictional barriers impede arrests and asset seizures. Attribution to specific Trickbot operators remains fraught due to pseudonym reuse—such as the handle "" potentially shared across individuals like Vitaly Kovalev and Maksim Galochkin—and reliance on incomplete underground data leaks like Trickleaks (chat logs from 2020–2021), which demand corroboration for accuracy. The group's leader, long concealed as "," evaded linkage despite prior sanctions on aliases until May 2025, when German Federal Criminal Police (BKA) identified Stern as Kovalev through analysis of internal chats and Operation Endgame evidence, underscoring persistent operational security that obscured hierarchies even after disruptions and leaks. Such challenges, compounded by absent direct ties to state entities (though implied support exists) and non-cooperative host nations, limit sanctions' disruptive impact, as actors adapt via modular and deniable affiliations.

Retaliation and Current Status

Operator Responses to Takedowns

Following the October 2020 disruption led by , in collaboration with the U.S. (FS-ISAC) and others, which involved seizing control of Trickbot command-and-control () servers and redirecting botnet traffic to null endpoints, operators rapidly restored functionality. By October 14, 2020, Trickbot activity had rebounded to near pre-disruption levels, with operators shifting primary delivery mechanisms to BazarLoader for reinfection campaigns. This quick recovery demonstrated the 's modular design and redundant infrastructure, allowing operators to bypass seized domains and servers within days through automated backups and alternative channels. Operators responded to the 2020 takedown by deploying updated malware variants, including version 2000016 on November 3, 2020, which introduced digitally signed updates using bcrypt hashing for enhanced authenticity verification. Subsequent iterations, such as version 100003 released by November 18, 2020, reverted to original module formats while incorporating packed executables (e.g., replacing unpacked mshareDll with shareDll) to evade detection. Infrastructure adaptations included leveraging compromised MikroTik routers as new C2 hosts (e.g., IP addresses 103.131.157.161 and 103.52.47.20) and integrating EmerDNS domains like morganfreeman.bazar as fallback resolvers, while phasing out Tor-based plugins to reduce traceability. Phishing campaigns, often bundled with Emotet droppers, were intensified by October 15, 2020, to reinstall Trickbot on compromised networks, restoring C2 communications from a temporary drop of 37 servers to 12. In the wake of further disruptions in 2021, including coordinated efforts by and others targeting persistent nodes, Trickbot operators enhanced resilience by obfuscating code with tags like and maintaining modular payloads for delivery, such as Conti and Ryuk variants. Internal communications reviewed from 2020 indicated no retreat; instead, the group invested over $20 million in 2021 to expand infrastructure and scale operations, prioritizing growth over evasion. Some operators integrated into ransomware-as-a-service (RaaS) ecosystems like Conti, adapting Trickbot's modules for broader exploitation. Despite ongoing law enforcement actions, including Operation Endgame in 2025 targeting alongside other initial access brokers, the persisted, accounting for 6.7% of remote access tools in detected incidents through 2024. These responses underscore the operators' emphasis on redundancy and rapid iteration, rendering geographically limited takedowns ineffective without global coordination across ISPs and registrars.

Resurgence Attempts and Ongoing Threats (2023-2025)

Following the 2021 disruptions, Trickbot operators demonstrated resilience by updating modules and expanding affiliate networks, enabling sporadic activity into 2023 despite fragmented infrastructure. In February 2023, the and imposed sanctions on key Trickbot members affiliated with the Russia-based group, targeting individuals involved in deploying the to infect millions of computers worldwide, including U.S. entities, for data theft and facilitation. These measures aimed to curb resurgence but did not fully dismantle residual command-and-control () servers or operator capabilities. By early 2024, Trickbot variants incorporated advanced antivirus evasion techniques, such as obfuscated and dynamic module loading, allowing continued spearphishing campaigns targeting financial sectors. In January 2024, Russian developer Vladimir Dunaev was sentenced in the U.S. to 65 months in prison for providing coding services that enhanced Trickbot's stealth and payload delivery, underscoring ongoing operator involvement post-takedown. March 2024 reports highlighted over 100 historical campaigns leveraging these updates, with infections persisting via malicious email attachments and drive-by downloads. Operation Endgame in May 2024 marked a major international effort, coordinated by with participation from the U.S., , and others, disrupting Trickbot's dropper infrastructure alongside IcedID, SystemBC, Pikabot, Smokeloader, and Bumblebee; actions included seizing over 100 servers, 2,000 domains, and arresting four individuals in and . Despite this, Trickbot's modular design—evolving from banking to ransomware enabler—facilitated partial resurgence, as operators rebranded variants and shifted to alternative channels by late 2024. In May 2025, Operation Endgame 2.0 targeted re-emergent threats, including Trickbot alongside , , Qakbot, DanaBot, and WarmCookie, dismantling 300 servers and seizing €3.5 million in to interrupt initial access brokers. Yet, by July 2025, affiliates linked to Ryuk, Conti, and Diavol had used Trickbot to exfiltrate over $724 million in through infections exceeding millions of endpoints, demonstrating operators' ability to regroup via underground forums and service-as-a-model offerings. This persistence highlights Trickbot's role as a resilient vector for financially motivated attacks, with threats amplified by its adaptability to post-disruption environments.

References

  1. [1]
    What is TrickBot Malware? - CrowdStrike
    Oct 2, 2023 · TrickBot malware is a banking Trojan released in 2016 that has since evolved into a modular, multi-phase malware capable of a wide variety ...
  2. [2]
    Win32/Trickbot threat description - Microsoft Security Intelligence
    Jun 3, 2020 · Trickbot is a modular trojan that first appeared in 2016. Trickbot can perform a number of actions on the infected device.
  3. [3]
    What is TrickBot? | Malwarebytes
    Is TrickBot a virus, ransomware, Trojan, or other type of malware? Learn about this sophisticated and dangerous threat to businesses and consumers alike.What is TrickBot malware? · What is the history of TrickBot?
  4. [4]
    TrickBot Malware - CISA
    May 20, 2021 · This Joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) framework, Version 8.
  5. [5]
    A Look Inside The TrickBot Botnet - Lumen Blog
    Oct 12, 2020 · By 2018, the one-time banking trojan had clearly evolved to become a loader for other malware, including Ryuk ransomware. Botnets are often ...
  6. [6]
    TrickBot banking Trojan horse – how to protect yourself - Kaspersky
    TrickBot is a master at hiding from its victim. It can thus only be detected and eliminated by paying close attention and using the best security software.
  7. [7]
    Fact Sheet: TrickBot Malware - CISA
    Since TrickBot's inception, the cybercrime group has used the malware to attack individuals and businesses globally across a wide range of sectors.
  8. [8]
    Trickbot disrupted | Microsoft Security Blog
    Oct 12, 2020 · As announced today, Microsoft took action against the Trickbot botnet, disrupting one of the world's most persistent malware operations.
  9. [9]
    Cyber Command, Microsoft take action against Trickbot botnet ...
    Oct 12, 2020 · The Pentagon's offensive hacking arm, Cyber Command, has carried out an operation to hinder the ability of TrickBot, one of the world's largest botnets, from ...
  10. [10]
    Major operation to take down dangerous malware systems | Eurojust
    May 30, 2024 · Authorities in the European Union and beyond have taken actions against droppers including IcedID, Pikabot, Smokeloader, Bumblebee and Trickbot, which ...
  11. [11]
    TrickBot is Dead. Long Live TrickBot! - Bitdefender
    TrickBot still crawls despite law enforcement kneecapping operation. It's operators are scrambling to restore the botnet back to its former glory.<|control11|><|separator|>
  12. [12]
    Threat Dissection: Trickbot - eSentire
    Trickbot malware was first observed in the wild in 2016, being utilized as a banking trojan similar to Emotet and Dyre.
  13. [13]
    [PDF] Fact Sheet: TrickBot Malware - CISA
    Mar 17, 2021 · The cybercrime group initially designed TrickBot as a banking trojan to steal financial data. Through continued development and new ...Missing: origins | Show results with:origins
  14. [14]
    Trickbot banking Trojan modules overview - Securelist
    Oct 19, 2021 · In this article we describe the functionality of the Trickbot (aka TrickLoader or Trickster) banking malware modules and provide a tip on ...
  15. [15]
    Bots and botnets in 2018 | Securelist
    Mar 29, 2019 · The TrickBot banker accounted for 12.85% of all unique attacks in 2018. Geography of TrickBot targets, 2018. Key features (shares relative to ...
  16. [16]
    October 2020's Most Wanted Malware: Trickbot and Emotet Trojans ...
    Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security.Missing: peak period
  17. [17]
    June 2021's Most Wanted Malware: Trickbot Remains on Top
    Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security.
  18. [18]
    September 2021's Most Wanted Malware: Trickbot Once Again Tops ...
    Check Point Research (CPR), the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security.Missing: integration | Show results with:integration
  19. [19]
    2021 Top Malware Strains - CISA
    Aug 25, 2022 · According to U.S. government reporting, TrickBot malware often enables initial access for Conti ransomware, which was used in nearly 450 global ...Missing: statistics | Show results with:statistics
  20. [20]
    [PDF] 2021-010: ACSC Ransomware Profile - Conti
    Conti threat actors have been observed utilising a number of well-known malware variants to gain initial access to target networks including Trickbot, ...
  21. [21]
    February 2021's Most Wanted Malware: Trickbot Takes Over ...
    Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security.Missing: disruptions 2022
  22. [22]
    October 2021's Most Wanted Malware: Trickbot Takes Top Spot for ...
    Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security.
  23. [23]
    Notorious TrickBot Malware Gang Shuts Down its Botnet Infrastructure
    Feb 25, 2022 · The modular Windows crimeware platform known as TrickBot formally shuttered its infrastructure on Thursday after reports emerged of its imminent retirement.
  24. [24]
    TrickBot operators slowly abandon the botnet and replace it with ...
    Feb 24, 2022 · Researchers believe the group behind TrickBot are moving the infected devices it controls to the newer, more difficult to detect Emotet malware.Missing: decline | Show results with:decline<|control11|><|separator|>
  25. [25]
    Identity Attack Watch: February 2022 - Semperis
    Conti acquires TrickBot talent to expand Active Directory exploits. Ransomware group Conti has hired former TrickBot penetration specialists to expand its ...
  26. [26]
    TrickBot takes down server infrastructure after months of inactivity
    Feb 28, 2022 · Is this really the end of one of the most active botnets in the last decade? History. The rise of TrickBot started when it was a banking Trojan ...
  27. [27]
    Multiple Foreign Nationals Charged in Connection with Trickbot ...
    Sep 7, 2023 · According to the FBI, in 2021, Conti ransomware was used to attack more critical infrastructure victims than any other ransomware variant. “The ...Missing: origin | Show results with:origin
  28. [28]
    The Trickbot/Conti Crypters: Where Are They Now? - IBM
    Despite its shutdown, operators from the Conti syndicate remain active and collaborative in new factions. IBM Security X-force shares the intel.
  29. [29]
    Trickbot | Banking Trojan Malware Technical Analysis - SentinelOne
    Mar 28, 2019 · Dive into the technical analysis of Trickbot, a sophisticated banking trojan malware. Learn its methods, impact, and strategies for ...Missing: core design
  30. [30]
    Trickbot Update: Brief Analysis of a Recent Trickbot Payload
    Sep 23, 2019 · Trickbot malware is on the rise again, with new efforts to evade detection and Emotet-style modular behavior. Can your AV Suite handle it?Missing: creators | Show results with:creators<|control11|><|separator|>
  31. [31]
    Deep Analysis of TrickBot New Module pwgrab - Fortinet
    Nov 8, 2018 · FortiGuard Labs found a new TrickBot variant, with a new module pwgrab, which attempts to steal credentials, autofill data, history and so ...
  32. [32]
    TrickBot, Software S0266 | MITRE ATT&CK®
    Oct 17, 2018 · TrickBot ; ID: S0266 ; Associated Software: Totbrick, TSPY_TRICKLOAD ; Type: MALWARE ; Platforms: Windows ; Contributors: Daniyal Naeem, BT Security; ...
  33. [33]
    Trickbot's New Reconnaissance Plugin - Fortinet
    Apr 9, 2018 · Fortinet FortiGuard Labs has found a new plugin named networkDLL that is being distributed to the victims of the Trickbot Trojan.
  34. [34]
    TrickBot: Not Your Average Hat Trick – A Malware with Multiple Hats
    TrickBot originated as a banking credential theft Trojan, but is now considered a modular malware enterprise with sophisticated system reconnaissance.<|separator|>
  35. [35]
    Revisiting Prolific Crimeware to Improve Network Detection: TrickBot
    Mar 2, 2019 · In this blog, we will explore TrickBot, a banking trojan, closely related to the banking trojan known as Dyre or Dyreza, with which it shares much of the ...<|separator|>
  36. [36]
    Trickbot: A primer - Cisco Talos Blog
    Mar 31, 2020 · The reason for this combination of malware is that the Trickbot modules for lateral movement are an efficient means to propagate across a ...<|control11|><|separator|>
  37. [37]
    What is a trickbot? - Huntress
    Oct 3, 2025 · Discover what TrickBot malware is, how it spreads, and why it's a major threat in cybersecurity. Learn ways to defend against TrickBot and ...
  38. [38]
    Triple Threat: Emotet Deploys TrickBot to Steal Data & Spread Ryuk
    This campaign describes each phase of the attack in detail, as well as the use of TrickBot to steal sensitive information before deploying Ryuk to ransom ...
  39. [39]
    TrickBot Malware Infection Leads to Ryuk Ransomware
    Jan 10, 2019 · Mandiant is tracking activity referred to as TEMP.MixMaster that involves the interactive deployment of Ryuk ransomware following TrickBot ...
  40. [40]
    TrickBot Attack Chain: Deconstructed & Mitigated - BeyondTrust
    This blog will deconstruct the TrickBot attack chains, identify the MITRE ATT&CK techniques leveraged, and explain how to mitigate these threats.
  41. [41]
    TrickBot Campaign Uses Fake Payroll Emails to Conduct Phishing ...
    Dec 9, 2019 · Unit 42 identified a Trickbot distribution campaign being delivered via phishing emails with subject lines using topics around payroll or ...
  42. [42]
    Trickbot campaign targets Coronavirus fears in Italy - Sophos News
    Mar 4, 2020 · The operators of a Trickbot spam campaign have found a new way to spread their digital infection: by using fears of a biological one.<|separator|>
  43. [43]
    Droppers, Downloaders and TrickBot: Detecting a Stealthy COVID ...
    Oct 8, 2020 · In September 2020, TrickBot's operators launched a malicious spam campaign that was effective at evading detection.
  44. [44]
    [PDF] Trickbot | HHS.gov
    Sep 1, 2020 · AKA Trickster, TrickLoader and TheTrick. • Modular malware, described as a banking trojan. • Similar to Dyreza, an old credential-stealer.
  45. [45]
    TrickBot Banker Insights | NETSCOUT
    Oct 25, 2016 · Reports have suggested a mix of campaign methodologies were used to initially distribute TrickBot, including use of Rig Exploit Kit and ...
  46. [46]
    TrickBot | NJCCIC
    NJCCIC Threat Profile. TrickBot is a banking trojan that deploys advanced browser manipulation techniques, server-side injections and redirection attacks.
  47. [47]
    Trojan:W32/Trickbot - F-Secure
    ... Trickbot trojan from a remote server, installs and runs it on the computer. More rarely, Trickbot may be delivered as the payload of an exploit kit. In that ...
  48. [48]
    Trickbot Rebirths Emotet: 140,000 Victims in 149 Countries in 10 ...
    Dec 8, 2021 · Check Point Research (CPR) warns of potential ransomware attacks, as it sees samples of Emotet fast-spreading via Trickbot.Missing: sectors | Show results with:sectors
  49. [49]
    TrickBot Malware Targeted Customers of 60 High-Profile ...
    Feb 16, 2022 · The notorious TrickBot malware is targeting customers of 60 financial and technology companies, including cryptocurrency firms, primarily located in the US.
  50. [50]
    Trickbot malware has infected 60 major global firms since 2020
    Feb 16, 2022 · Companies including Microsoft, Amazon and Barlcays Bank have all been the target of malicious attacks to steal private info.Missing: scale | Show results with:scale
  51. [51]
    Inside Trickbot, Russia's Notorious Ransomware Gang - WIRED
    Feb 1, 2022 · Thousands of miles away, just two days later members of the Trickbot cybercrime group privately gloated over what easy targets hospitals and ...Missing: history timeline
  52. [52]
    Malware Profile: TrickBot targets industrial organizations
    May 1, 2024 · TrickBot malware is a banking Trojan released in 2016, but it has since evolved well past that. It is now a modular, multiphase malware ...Missing: sectors | Show results with:sectors
  53. [53]
    12 targeted for involvement in ransomware attacks against critical ...
    Oct 29, 2021 · These attacks are believed to have affected over 1 800 victims in 71 countries. These cyber actors are known for specifically targeting large
  54. [54]
    Unprecedented Shift: The Trickbot Group is Systematically Attacking ...
    IBM Security X-Force uncovered evidence indicating that the Russia-based cybercriminal syndicate "Trickbot group" has been attacking Ukraine since the ...
  55. [55]
    Russian National Sentenced for Involvement in Development and ...
    Jan 25, 2024 · According to court documents and public reporting, Vladimir Dunaev, 40, of Amur Oblast, Russia, provided specialized services and technical ...Missing: origin | Show results with:origin
  56. [56]
    WIZARD SPIDER (Threat Actor) - Malpedia
    The WIZARD SPIDER threat group is the Russia-based operator of the TrickBot banking malware. This group represents a growing criminal enterprise.
  57. [57]
    Wizard Spider - crowdstrike.com
    The group surfaced in September 2016 with their commodity banking malware most commonly known as TrickBot. Their operations changed significantly in August ...Missing: cybercrime ecosystem
  58. [58]
    TRM Analysis Corroborates Suspected Ties Between Conti and ...
    Apr 5, 2022 · TRM investigators indicates ties between two ransomware groups, Conti and Ryuk. Both Conti and Ryuk also appear to be part of the Wizard Spider cybercriminal ...
  59. [59]
    Wizard Spider: Taking A Look At The Notorious Russian Cybercrime ...
    Wizard Spider is a notorious Russian cybercrime group which is part of a larger cyber-cartel known as the Ransom Cartel or Maze Cartel.Missing: ecosystem | Show results with:ecosystem<|separator|>
  60. [60]
    A look inside Russian cybercrime syndicate TrickBot reveals an ...
    Jul 15, 2022 · The massive trove of leaked messages and other data offer a deep look at the Russian cybercrime ecosystem.
  61. [61]
    U.S. DOJ, Treasury and U.K. Authorities Take Action Against ...
    Sep 6, 2023 · According to Treasury, the Trickbot group has ties to Russian intelligence services. Today's sanctions and the parallel criminal cases are the ...
  62. [62]
    Microsoft and Other Tech Companies Take Down TrickBot Botnet
    Oct 13, 2020 · Microsoft and its partners analyzed over 186,000 TrickBot samples, using it to track down the malware's command-and-control (C2) infrastructure ...<|separator|>
  63. [63]
    Trickbot Tenacity Shows Infrastructure Resistant to Takedowns
    The takedown followed three weeks of disruptive operations against the Trickbot infrastructure reportedly carried out by US Cyber Command. Yet the takedowns ...
  64. [64]
    Largest ever operation against botnets hits dropper malware ...
    May 29, 2024 · International operation shut down droppers including IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee leading to four arrests and takedown of over 100 ...
  65. [65]
    TrickBot and Other Malware Droppers Disrupted by Law Enforcement
    May 30, 2024 · The TrickBot botnet and other malware droppers have been targeted by international law enforcement in Operation Endgame.
  66. [66]
    Operation ENDGAME strikes again: the ransomware kill ... - Europol
    May 22, 2025 · It targeted new malware variants and successor groups that re-emerged after last year's takedowns, reinforcing law enforcement's capacity to ...
  67. [67]
    Trickbot dev arrested in Moscow - Risky Biz News
    Jul 19, 2024 · In other news: Indian crypto exchange hacked for $230 million; UK wants mandatory ransomware reporting; new Port Shadow attack on VPNs.<|separator|>
  68. [68]
    United States and United Kingdom Sanction Members of Russia ...
    Feb 9, 2023 · The United States, in coordination with the United Kingdom, is designating seven individuals who are part of the Russia-based cybercrime gang Trickbot.Missing: origin | Show results with:origin
  69. [69]
    United States and United Kingdom Sanction Additional Members of ...
    Sep 7, 2023 · ... Trickbot cybercrime group. Russia has long been a safe haven for cybercriminals, including the Trickbot group. Today's action was taken by ...Missing: origin | Show results with:origin
  70. [70]
    Trickbot in Light of Trickleaks Data - Nisos
    Attribution work by its very nature is challenging and dependent on the timeliness and accuracy the data researchers initially have on the ...
  71. [71]
    Cops in Germany Claim They've ID'd the Mysterious Trickbot ...
    May 30, 2025 · Despite a wave of law enforcement disruptions and a damaging leak of more than 60,000 internal chat messages from Trickbot and the closely ...
  72. [72]
    Trickbot Rebounds After 'Takedown' - BankInfoSecurity
    Oct 20, 2020 · The recent “takedown” of Trickbot by Microsoft and others had only a temporary effect; the botnet's activity levels have already rebounded, ...Missing: resurgence | Show results with:resurgence
  73. [73]
    TrickBot Malware Adds New Tricks To Evade Antivirus Solutions
    Mar 22, 2024 · In this latest version, TrickBot's operators added antivirus evasion techniques to its long list of cyber-tricks. With a history of 100 ...
  74. [74]
    Ransomware Gangs Leverage TrickBot Malware to Steal US $724 ...
    Jul 31, 2025 · Ransomware affiliates associated with groups like Ryuk, Conti, and Diavol have increasingly relied on the modular TrickBot malware.
  75. [75]
    TrickBot Malware Enables Ransomware Gangs to Exfiltrate US $724 ...
    Jul 31, 2025 · TrickBot, an advanced modular malware platform first emerging as a banking Trojan in 2016, has grown into one of the most formidable.