Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Trickbot Using Fake Black Lives Matter Voting Campaign for Distribution
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trickbot Using Fake Black Lives Matter Voting Campaign for Distribution

6 years ago David Bisson
Trickbot Using Fake Black Lives Matter Voting Campaign for Distribution

Security researchers came across an attack email that leveraged a fake Black Lives Matter voting campaign to distribute Trickbot malware.

Digital security firm Abuse.ch found that the attack email pretended to originate from a sender known as “Country administration.” Building on its subject line “Vote anonymous about Black Lives Matter,” the attack email invited recipients to leave anonymous feedback on the Black Lives Matter movement by filling out and returning an attached document called “e-vote_form_3438.doc.”

Phishing email (Source: Bleeping Computer)

When opened, the attachment informed recipients that they needed to “Enable Editing” or “Enable Content” by clicking on a button. Those individuals who complied triggered the document to run its malicious macros. The code downloaded a malicious DLL onto the recipient’s computer and executed it.

Bleeping Computer explains what happened next:

This DLL is the TrickBot trojan that, when executed, will download further modules to the infected computer to steal files, passwords, security keys, spread laterally throughout the network, and allow other threat actors to install ransomware.

Due to this, a TrickBot trojan can be a devastating infection regardless of whether you are a corporate victim or a home user.

This isn’t the first time that Trickbot attracted the attention of the security community in 2020. In mid-April, for instance, Microsoft revealed that the malware had thus far been the most pervasive malware operation to exploit the coronavirus 2019 (COVID-19) pandemic as a theme. In one of those attacks, the threat had leveraged hundreds of macro-laden documents that had pretended to originate from a non-profit offering a free COVID-19 test.

The latest Trickbot distribution campaign highlights the need for organizations to defend themselves against phishing attacks. One of the ways they can do this is by educating their employees about some of the most common types of phishing campaigns that are in circulation today. This resource provides an excellent starting point.

The post ” Trickbot Using Fake Black Lives Matter Voting Campaign for Distribution” appeared first on TripWire

Source:TripWire – David Bisson

Tags: Coronavirus, COVID-19, Encryption, Exploit, Malware, Microsoft, Phishing, Ransomware, TripWire

Continue Reading

Previous ¿Qué son los desvíos en configuraciones o ‘configuration drift’?
Next Babylon Health App Leaked Patients’ Video Consultations

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email

3 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits

4 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access

16 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets

16 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

17 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Ghostwriter Targets Ukrainian Government With Geofenced PDF Phishing, Cobalt Strike

19 hours ago [email protected] (The Hacker News)

Recent Posts

  • On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email
  • CISA Adds Cisco SD-WAN CVE-2026-20182 to KEV After Admin Access Exploits
  • Cisco Catalyst SD-WAN Controller Auth Bypass Actively Exploited to Gain Admin Access
  • Stealer Backdoor Found in 3 Node-IPC Versions Targeting Developer Secrets
  • ThreatsDay Bulletin: PAN-OS RCE, Mythos cURL Bug, AI Tokenizer Attacks, and 10+ Stories

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT