WaterISAC Navigation
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
  • About
  • Report Incident
  • Contact Us
  • Become a Member
  • NRWA Signup
  • WaterISAC Champions
Home Community Partnerships Another Look at the Latest Version of TrickBot
Become a Member

Log in

  • Upcoming Events
  • Resource Center
  • Tools
  • Webcasts
  • Contaminant Databases
  • Directory
  • About
  • Log in

  • My Account

  • Logout

  • Report Incident
  • Contact Us
  • NRWA Signup
  • WaterISAC Champions
More Resources

Another Look at the Latest Version of TrickBot

Author: Charles Egli

Created: Tuesday, January 26, 2021 - 20:29

Categories: Cybersecurity

IBM Security Intelligence examines the latest version of TrickBot, comparing it to its precedent and taking a closer look at the components its developers kept or modified. WaterISAC previously reported on this latest evolution of this notorious malware, specifically in the December 3, 2020 Security & Resilience Update. At that time TrickBot had recently suffered, but ultimately survived, a takedown attempt by security vendors and law enforcement agencies. Following that, TrickBot’s operators released a new and more persistent version of the malware using a UEFI/BIOS bootkit (dubbed “TrickBoot”) to help it remain undetected on infected devices. In addition to looking at this persistence mechanism, IBM Security Intelligence’s technical analysis also examines and compares components that include its injection technique, bot configuration, mutex naming concept, and compromise check. The analysis concludes by noting that TrickBot and the cyber crime syndicate around it are in full swing, adding that security teams should prioritize cleaning or reimaging networked devices on which the malware is detected. As it notes, TrickBot can be a foot in the door for a number of attacks, the worst of which can be an all-out ransomware and extortion operation against your organization. Read the analysis at IBM Security Intelligence.

Related Resources

(TLP:CLEAR) FIRESTARTER Backdoor and Updated Emergency Directive for CISCO Firepower and Secure Firewall Devices

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:GREEN) FBI FLASH – Newly Observed Ransomware Variant Black Shrantac Threat to U.S. Entities

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness
Members Only

(TLP:AMBER+STRICT) Likely PRC State-Sponsored Activity Observed in the Water Sector – DocuSign Phishing Tactics Identified

Apr 23, 2026 in Cybersecurity, Federal & State Resources, Security Preparedness

Become a Member
FAQs
About
Report Incident

Terms & Conditions
Privacy Policy
AI Policy
Contact Us

LinkedIn

1250 I Street NW, Suite 350
Washington, DC 20005
1-866-H2O-ISAC (1-866-426-4722)
© 2026 WaterISAC. All Rights Reserved.

Toggle the Widgetbar