The developers behind TrickBot have modified the banking trojan to target customers of major mobile carriers, researchers have reported.
As of August, the dynamic webinjects that TrickBot uses were updated to target Verizon Wireless, T-Mobile and Sprint, according to a blog post this week from Secureworks’ Counter Threat Unit Research Team. When infected users visit the website of any of these carriers, TrickBot’s C2 server will serve up a fake form field that asks them to enter their PIN code and, at least in certain cases, their username and password.
Noting the malicious PIN code request, Secureworks theorises that the malware developers – a group the researchers refer to as Gold Blackburn (and affiliates) – may be interested in port-out or SIM swap fraud schemes. Secureworks recommends that wireless device owners protect themselves by using time-based one-time password multi-factor authentication instead of SMS-based MFA, enabling PINs on mobile accounts, and avoiding using telephone numbers as a password reset option.
This article was originally published on SC Media US.