Even as the TrickBot infrastructure closed shop, the operators of the malware are continuing to refine and retool their arsenal to carry out attacks that culminated in the deployment of Conti ransomware.
IBM Security X-Force, which discovered the revamped version of the criminal gang’s AnchorDNS backdoor, dubbed the new, upgraded variant AnchorMail.
AnchorMail “uses an email-based [command-and-control] server which it communicates with using SMTP and IMAP protocols over TLS,” IBM’s malware reverse engineer, Charlotte Hammond, said. “With the exception of the overhauled C2 communication mechanism, AnchorMail’s behavior aligns very closely to that of its AnchorDNS predecessor.”
The cybercrime actor behind TrickBot, ITG23 aka Wizard Spider, is also known for its development of the Anchor malware framework, a backdoor reserved for targeting selected high value victims since at least 2018 via TrickBot and BazarBackdoor (aka BazarLoader), an additional implant engineered by the same group.
Over the years, the group has also benefited from a symbiotic relationship with the Conti ransomware cartel, with the latter leveraging TrickBot and BazarLoader payloads to gain a foothold for deploying the file-encrypting malware.
“By the end of 2021, Conti had essentially acquired TrickBot, with multiple elite developers and managers joining the ransomware cosa nostra,” AdvIntel’s Yelisey Boguslavskiy noted in a report published mid-February.
Less than 10 days later, the TrickBot actors shut down their botnet infrastructure following an unusual two-month-long hiatus in the malware distribution campaigns, marking a pivot that’s likely to channel their efforts toward stealthier malware families such as BazarBackdoor.
In the midst of all these developments, the AnchorDNS backdoor has received a facelift of its own. While the predecessor communicates to its C2 servers using DNS tunneling – a technique that involves the abuse of the DNS protocol to sneak malicious traffic past an organization’s defenses – the newer C++-based version makes use of specially crafted email messages.
images from Hacker News