Trickbot Expands Global Targets Beyond Banks and Payment Processors to CRMs
ATT&CK techniques detected
T1071.001Web Protocols
79%
"services. all of them used port 443 / https as a connection method from the infected machine back to the c & c host, a method commonly used by malware authors to evade detection from network security devices that don ’ t inspect encrypted traffic. samples analyzed the following m…"
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
TrickBot shows no signs of slowing down as new targets are added and command and control servers hide within web hosting providers’ networks.