TrueBot Malware: The Infection of Businesses

TrueBot Malware: The Infection of Businesses

Cisco Talos reveals found infamous TrueBot malware and hits the U.S with additional attached infamous Clop ransomware.

Picture1.jpg

What is this?

TrueBot is under development since 2017, it targets systems to collect and gathering information of infected host to assistant in deploying more malware. The new version can load and execute more modules and shell codes.

How is it deliveried?

TrueBot is more commonly delivered via malicious emails, or with infected USB drives.

How to protect myself ?

1- First, the operating system and all software must always be up to date. 2- Deploy multi-factor authentication in order to avoid credential compromise. 3- Be careful with attachments you receive via email. 4- Avoid using USB drivers that might be suspicious. 5- Install Antivirus on your devices, and keep it up to date too.

Finally, always pay attention on what you do on the internet. If you notice any unexpected moves on your device, take it seriously and investigate carefully what might have happen. Trace and clean (reinstall the OS in some cases). The important thing is, do not neglect the issue.

Related Posts

 Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Grazie CrowdStrike per averci ricordato a che cosa serve il Testing

Il caso di CrowdStrike dimostra quanto sia essenziale investire in attività di QA e testing. Questi processi non solo migliorano l'affidabilità e la sicurezza del software, ma proteggono anche le azie

Polyfill js - Another Supply Chain Attack

Polyfill js - Another Supply Chain Attack

What happens if a popular open-source JavaScript library get hacked?

Agile and Security

Agile and Security

How Agile practices can improve the shift security left approach

MongoDB RomeMUG: Meet Up #9

MongoDB RomeMUG: Meet Up #9

"Deploy an Application on MongoDB Atlas"

Automated TLS Certificate Management

Automated TLS Certificate Management

TLS Certificate

XZ Backdoor (CVE-2024-3094) - A hidden backdoor in open-source software

XZ Backdoor (CVE-2024-3094) - A hidden backdoor in open-source software

How a malicious actor was able to gain credibility and inject malicious payload in a popular unix-like compression library

Windows Server & VPN SSL - MFA with Azure AD

Windows Server & VPN SSL - MFA with Azure AD

MFA implementation with Entra ID

Tor Browser: un piccolo report sulle problematiche relative alla privacy

Tor Browser: un piccolo report sulle problematiche relative alla privacy

Una risposta agli attacchi relativi alla privacy