Australia markets closed
  • ALL ORDS

    6,373.70
    -10.00 (-0.16%)
     
  • ASX 200

    6,167.00
    -6.80 (-0.11%)
     
  • AUD/USD

    0.7142
    +0.0024 (+0.34%)
     
  • OIL

    39.78
    -0.86 (-2.12%)
     
  • GOLD

    1,903.40
    -1.20 (-0.06%)
     
  • BTC-AUD

    18,150.34
    +85.35 (+0.47%)
     
  • CMC Crypto 200

    260.05
    -1.40 (-0.54%)
     
  • AUD/EUR

    0.6017
    -0.0001 (-0.02%)
     
  • AUD/NZD

    1.0666
    -0.0001 (-0.01%)
     
  • NZX 50

    12,470.34
    +63.05 (+0.51%)
     
  • NASDAQ

    11,692.57
    +29.66 (+0.25%)
     
  • FTSE

    5,860.28
    +74.63 (+1.29%)
     
  • Dow Jones

    28,335.57
    -28.09 (-0.10%)
     
  • DAX

    12,645.75
    +102.69 (+0.82%)
     
  • Hang Seng

    24,918.78
    +132.65 (+0.54%)
     
  • NIKKEI 225

    23,516.59
    +42.32 (+0.18%)
     

US Cyber Command disrupted the notorious Trickbot botnet

Mariella Moon
·Associate Editor
·2-min read

The US Cyber Command, the Defense Department division in charge of its cyberspace operations, recently mounted an operation to disrupt one of the most massive and notorious botnets today. According to The Washington Post, CyberCom successfully (albeit temporarily) interrupted the Trickbot botnet’s operations at least a couple of times over the last few weeks. The botnet is composed of at least a million hijacked computers infected with the Trickbot malware and reportedly run by Russian-speaking criminals.

KrebsonSecurity, which was the first to report on the disruptions, the entity that interrupted the botnet sent infected computers a command that disconnected them from the servers Trickbot’s operators used to control them. Also, the entity filled the Trickbot database with bogus records to confuse the operators. At the time, Krebs didn’t have information on who or what was responsible.

The Trickbot malware can be used to steal sensitive information, such as financial data and login credentials, and the botnet can be used to infect systems with ransomware. Just this September, the botnet was used against healthcare provider Universal Health Services in an attack that locked up its network with a ransomware called Ryuk.

The Post’s report suggests that CyberCom’ actions are part of its efforts to protect the 2020 Presidential Election against foreign interference. Gen. Paul Nakasone, head of CyberCom, told The Post in a statement back in August:

“Right now, my top priority is for a safe, secure, and legitimate 2020 election The Department of Defense, and Cyber Command specifically, are supporting a broader ‘whole-of-government’ approach to secure our elections.”

That said, the group didn’t cause permanent harm to the botnet’s operations. Krebs says Trickbot operators have already started rebuilding the botnet. Hold Security’s Alex Holden also told the expert that “their ransomware operations are pretty much back in full swing” and that they’re even looking to demand more money from victims to recoup their losses.