TrickBot, Dridex, and TA505 are threat g…


0


TrickBot, Dridex, and TA505 are threat groups linked to various Russian-speaking threat actors who sell access to victims’ systems on the dark web. Lazarus has been found to be infrequently using TrickBot’s codes in its attacks.

Establishing the connection
TrickBot is a privately-run Malware-as-a-Service (Maas) offering, which can be accessed by only top-tier threat actors.

TA505 is a cybercriminal group that has purchased a huge number of tools from the underground.
According to a report by LEXFO, past Lazarus infections have been spotted to coexist with TrickBot and Emotet.

TA505 and Lazarus IOCs were found together in bank networks. Moreover, the PS post-intrusion scripts appertaining to Lazarus and TA505 have been discovered to be similar.

According to a CISA alert, North Korea-based hackers may “be working with or contracting out to criminal hacking groups, like TA505, for initial access development.”

The bottom line
It is very likely that threat actors with access to TrickBot infections are in touch with North Korean state-sponsored hackers. Knowing that there is a link between different threat actors provides defenders an opportunity to identify a potential second problem when the first one occurs.
〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️

💡Follow @hackxsecurity to learn ethical hacking and cyber security stuff.

💡Follow @hackxnews for daily updates and content in cyber security field.

💡Visit us : www.hackxsecurity.com

💡Follow us on Telegram https://t.me/hackxsecurity

〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️〰️


Like it? Share with your friends!

0
Cyberg

0 Comments

Your email address will not be published. Required fields are marked *

Adblock Detected!

Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

Choose A Format
Story
Formatted Text with Embeds and Visuals