What TrickBot tells us about the future of



What TrickBot tells us about the future of malware  Malware attackers are increasingly sophisticated. Here’s what to know  On TrickBot and the future of malware 




 




Malware threats have plagued organizations for decades, but that’s no reason to be complacent with a security strategy that has to date protected your organization. Now more than ever, malware is quickly evolving — operating at increasingly complex levels of infectiousness and evasiveness, and swiftly spreading into the Internet of Things and the cloud. But beyond the acceleration of novel and unique malware activity, the threat groups behind them have grown more resilient and pervasive. 




 




We’ve entered a concerning new chapter in the metamorphosis of malware. Today, cybercriminal groups often have highly skilled developers; decentralized, corporate-like operations; and partnerships with other threat actors that allow them to evolve and quickly rebound from setbacks. The apparent end goal for these collectives is to create more victims and share the spoils, rather than compete against each other to infect the same victims.  




One such example is the TrickBot gang, which IBM Security X-Force has observed for years. According to this year’s IBM Security X-Force Threat Intelligence Index, TrickBot was one of 2021’s most active threat groups. Tracked as ITG23, also known as Wizard Spider, the notorious malware gang is best thought of as a group of groups, all of which report to “upper management” — not unlike a large corporation. The collective shares infrastructure, support functions and has IT teams, recruiters and even human resources. These attributes make ITG23 more agile and resilient to disruptions and shutdowns. 




 
Support the originator by clicking the read the rest link below.