Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/9/2020
01:45 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

TrickBot Group Adds New PowerShell-Based Backdoor to Arsenal

PowerTrick is sort of a custom-version of PowerShell Empire and can be used to download additional malware, SentinelOne says.

Russia's infamous TrickBot organized cybercrime group has a new trick up its sleeve for high-value targets — a custom fileless PowerShell-based backdoor designed for stealth, persistence, and reconnaissance inside infected networks.

SentinelOne, which has been tracking the malware, has dubbed it PowerTrick. In a blog post Thursday, the vendor described the new malware as having similar capabilities as the PowerShell Empire open source penetration-testing tool but being harder to detect because it is custom developed.

Vitali Kremez, lead cybersecurity researcher at SentinelOne's SentinelLabs, says PowerTrick is a fileless post-exploitation tool that TrickBot operators are using to stealthily drop additional malware on systems belonging to organizations the group perceives as being of high value.

The malware is being used to enable mass data collection, reconnaissance, persistence, and lateral movement on infected networks. "We assess with high confidence at least some of the initial PowerTrick infections are being kicked off as a PowerShell task through normal TrickBot infections," Kremez says.

TrickBot is a Russia-based group that initially specialized in bank fraud activities but over the years has increasingly begun targeting enterprise organizations as well. The group is believed to have broken into numerous enterprise networks and gathered a massive amount of information on each of them, including credentials, network, and domain controller data.

In recent years, the group has been selling access to that data to other financially motivated cybercrime groups and more recently to advanced persistent threat (APT) groups such as North Korea's Lazarus operation. According to SentinelOne, TrickBot has processed and indexed data on victims it has compromised in such a manner that its customers can quickly identify high-value targets or the least-protected organizations.

In addition to selling access to compromised networks, TrickBot in recent years has also let other vetted groups use its custom malware to carry out attacks and distribute other malware. One example is Anchor, a collection of custom and existing tools for everything from post-exploit malware installation to cleanup and removal of all evidence of a break-in. Like many other cybercrime and APT groups, TrickBot also has extensively leveraged legitimate admin tools and services — notably PowerShell, Metasploit, Cobalt Strike, and PowerShell Empire — in its post-exploit operations.

"PowerTrick is a private solution that the TrickBot group leverages for the deployment of additional targeted malware," Kremez says. Similar to how PowerShell Empire's stager component works, PowerTrick can be used to download a larger, more powerful backdoor for executing other commands such as those for harvesting credentials, moving laterally or for installing more backdoors. TrickBot Anchor and another backdoor called TerraLoader are two examples of malware that attackers are deploying via PowerTrick, Kremez says.

The end goal of the PowerTrick backdoor is to bypass restrictions and security controls and exploit strongly protected and secure high-value networks. Like its other malware products, TrickBot appears to have made PowerTrick available to other cybercrime and APT groups as well, according to Kremez.

SentinelLabs has developed a mock command-and-control panel that organizations can use to test for PowerTrick related infections. The security vendor has also released indicators of compromise related to the threat.

Related Content:

Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "In App Development, Does No-Code Mean No Security?"

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13485
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows IP Whitelist bypass via an X-Forwarded-For HTTP header.
CVE-2020-13486
PUBLISHED: 2020-05-25
The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection.
CVE-2020-13482
PUBLISHED: 2020-05-25
EM-HTTP-Request 1.1.5 uses the library eventmachine in an insecure way that allows an attacker to perform a man-in-the-middle attack against users of the library. The hostname in a TLS server certificate is not verified.
CVE-2020-13458
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
CVE-2020-13459
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.