FBI And CISA Warn Trickbot's Latest Attacks Involve DMV
Published: May 04, 2021 on our newsletter Security Fraud News & Alerts Newsletter.
No one is happy about getting an email from the DMV, especially one claiming to have proof of a traffic violation. But what happens next, after opening the email and clicking on a link, ends up much worse than any traffic offense could be. A Trickbot malware infection happens; the latest hacking scheme that involves using the DMV as a phishing lure. This new Trickbot campaign is targeting PCs, and the FBI and Cybersecurity and Infrastructure Security Agency (CISA) have released a joint advisory about this latest addition to Trickbot’s arsenal.
Trickbot is proven to be a powerful tool for cybercriminals who can lease access to infected devices and then customize and deploy the malware themselves. Trickbot is a modular malware, meaning it can be altered by hackers to deliver the payload they desire. Prior attempts by a coalition of security professionals once tried to disrupt Trickbot, but it didn’t last for long. Within weeks, its malware campaigns were back at it again.
Since 2016, Trickbot has been a major disrupter with its attacks on organizations and individuals alike. Joint recommendations by the FBI and CISA can help protect enterprise from its grasp, and they should be acted upon as quickly as possible.
Having a cyber-smart staff that’s trained on the latest online scams can be an invaluable asset for any company’s cybersecurity. As such, providing ongoing security education for staff of all levels is critically important. And since phishing emails of all types are a hacker’s favorite tool for spreading malware, including socially engineered emails that target individuals by name, all email phishing lures should be explored. Remember, an employee who can flag an email that’s a phishing expedition can help prevent an enterprise from very costly situations.
Their advice continues with a reminder that software should always be updated with the latest patches, as many include security bug fixes that can keep attackers from exploiting the vulnerability. Using multi-factor-authentication (MFA) across an entire network can prevent login credentials from being stolen, or at least not as easily as hackers would prefer. Remember, all it takes is one wrong click to upend and entire organization, so click wisely.
Keep up to date: Sign up for our Fraud alerts and Updates newsletter
Want to schedule a conversation? Please email us at email@example.com