Banking Botnet Profit Share

Instead of ripping each other's malware out of victim systems, the groups behind Trickbot and IcedID are playing nice with each other, says the risk intelligence firm, FlashpointIn what could be the beginning of a significant new trend, the operators of two separate banking botnets appear to have begun collaborating with each other in targeting systems and stealing money from victims.

Flashpoint says it has evidence suggesting the operators of the Trickbot and IcedID botnets have gotten into some kind of a profit-sharing arrangement in which they are using each other's malware and infrastructure to cash out victim bank accounts.

Such partnerships are extremely rare in the cyber-crime world where rival groups are more likely to rip each other's malware out of victim systems than collaborate on a malicious campaign. For enterprises, the trend could spell new trouble.

"This collaboration indicates that sophisticated botnet malware operators will … team up to defeat anti-fraud measures in place when [a] reasonable profit-sharing agreement can be reached amongst various groups," says Vitali Kremez, director of research at Flashpoint.

According to the vendor, some malware samples that it has recently analyzed suggest that computers infected with IcedID are also downloading the Trickbot banking Trojan.

IcedID is a banking malware sample that first popped up in the wild last April and is being massively distributed via spam email. Its victims have included financial services companies, retailers, and technology firms.

Up to now, IcedID has typically been installed on systems via a downloader called Emotet. But Flashpoint says that it now appears IcedID is being sent directly as spam. When the malware is installed on a system, it then acts as a downloader for Trickbot, which in turn installs other malware modules on the compromised system.

"IcedID is a primarily banking malware with downloader capabilities to install additional malware," Kremez says.

One of its key features is its ability to maintain persistence on infected machines. TrickBot is more of a multi-modular banking malware that has targeted victims in a slew of industries. The group behind it has used infected systems for a range of different malicious activities including bank account hijacking and for cryptocurrency mining.

"It is considered to be the successor to the Dyre banking malware and contains various credential-stealing, cryptocurrency mining as well as network propagation [features], amongst others," Kremez notes.

Flashpoint says the collaboration between the IcedD and Trickbot groups has given the pair significant new capabilities. The two groups are using their respective malware tools to steal credentials for breaking into bank accounts belonging to the owners of infected systems and stealing money from them.

Members from the two groups monitor infected systems for activities that are of specific interest. For instance, when the owner of a system that is infected with Trickbot and IcedID malware tries to log into a bank account of interest, the botmaster grabs the login credentials and other details and passes it on to affiliates.

The affiliates then use the login credentials and other information required to access the victim's account and transfer money out of it to rogue accounts previously opened by money mules. The mules often open the fraudulent bank accounts in the same financial institution and same geographic location as the victim's own account.

"The group botmasters collaborate on cashing out compromised bank accounts and share profits from their infections," Kremez says.

IcedID appears to be more focused on banking account-stealing operation, while TrickBot group also deploys additional modules to maximize profits from the compromised machines. Each compromised machine bears indicators of who exactly delivered the infection so it is easier to share the spoils.

Based on how the collaboration between IcedID and Trickbot has been working so far and the shared infrastructure they have built, it is quite likely that the operators of the two groups will continue to partner, Flashpoint said.

Expect to see more malware developers and fraud masters try and foster such collaborative partnerships if doing so can help them bypass the latest anti-fraud measures.

Dark Reading

You Might Also Read: 

Botnets Are Here To Stay:

Interpol Located & Shut Down 9,000 Command Servers
 

 

« Ukraine Detects A Cyber Attack On A NATO Member
Russia Is Building A Separate Military Cloud »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Cyberteq

Cyberteq

Cyberteq is an innovative Information and Communication Technology Consulting Company, enabling it’s customers to take full advantage of the latest technologies in a secure manner.

SOCOTEC Certification International

SOCOTEC Certification International

SOCOTEC Certification International has been providing management systems assessment and accredited ISO certification services to organisations around the world since 1995.

Savanti Consulting

Savanti Consulting

Savanti provides practitioner-led cyber security services tailored to meet each organisation’s unique requirements.

Internet Infrastructure Investigation

Internet Infrastructure Investigation

Internet Infrastructure Investigation offers a bespoke Internet Governance Solution to your brands online infringement problems.

Thridwayv

Thridwayv

Thirdwayv helps your enterprise realize the full potential of loT connectivity. All while neutralizing security threats that can run ruin the customer experience - and your reputation.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Future Planet Capital

Future Planet Capital

Future Planet is the impact-led, global venture capital firm built to invest in high growth potential companies from the world's top research centres.

Oivan

Oivan

Oivan harnesses the strengths of the web, mobile, cloud, cybersecurity, and blockchain technologies to help our clients to launch transformative digital services.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.

Robosoft Technologies

Robosoft Technologies

Robosoft Technologies is a full-service digital transformation partner. We provide end-to-end digital transformation services in areas including cybersecurity.

Cybersecurity Agency of Catalonia - Spain

Cybersecurity Agency of Catalonia - Spain

Cybersecurity Agency of Catalonia is responsible for implementing public policies in the field of cybersecurity and developing the cybersecurity strategy of the Generalitat de Catalunya.

Point3 Security

Point3 Security

Point3 Security is a premier information security organization that provides the industry with the talent screening and analytical tools to enhance its workforce.

United Nations Office of Counter-Terrorism (UNOCT)

United Nations Office of Counter-Terrorism (UNOCT)

UNOCT provides UN Member States with the necessary policy support of the UN Global Counter-Terrorism Strategy, and wherever necessary, expedites delivery of technical assistance.