• About
  • Advertise
  • Careers
  • Contact
Sunday, February 5, 2023
No Result
View All Result
NEWSLETTER
Cyber360 News
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us
No Result
View All Result
Cyber360 News
No Result
View All Result
Home Security

Notorious TrickBot Trojan Now Steals Windows Active Directory Credentials

by Cyber360 News
January 24, 2020
in Security
0
Notorious TrickBot Trojan Now Steals Windows Active Directory Credentials
0
SHARES
0
VIEWS
Share on FacebookShare on Twitter

TrickBot trojan which earlier wreaked havoc on Windows users by disabling Windows Defender and infecting them has now been modified to steal Windows Active Directory credentials. This new trait of the notorious trojan makes it more lethal as far as security is concerned.

Affecting Windows domain controllers, TrickBot trojan’s new module dubbed “ADll” executes a set of commands to steal Windows Active Directory information. The new module has been discovered by Sandor Nemes, a security researcher from Virus Total.

How Windows Active Directory Credentials Are Stored?

When a server acts as a domain controller, the Active Directory database is created and is saved to the default C:WindowsNTDS folder on the domain controller.

Information including passwords, users, computers, and groups of Windows Active Directory are stored in a file called ntds.dit inside this database. Since this is highly sensitive information, Windows encrypts it using a BootKey which is stored in the System component of the Registry.

ntdsutil command [Source: Bleeping Computer]

Standard file operations cannot access the BootKey and a special tool called ntdsutil, used by administrators performing database maintenance is used to work with ntds.dit database.

How TrickBot Steals Active Directory Credentials?

To create a dump of Active Directory, administrators use a command named ifm (install from media). This command creates an installation media for setting up new Domain Controllers.

LEARN MACHINE LEARNING SQUARE AD

TrickBot trojan’s new ADll module abuses the ifm command to create a copy of the Windows Active Directory database. The entire database is dumped into the %Temp% folder. The bot then sends the collected information to the author.

The harvested data can be used to infect more computers in the network and could be used by other malware like Ryuk ransomware that is always looking for such vulnerabilities.

To learn more about how TrickBot trojan and other malware can exploit Active Directory services, you can watch this video by Vitali Kremez from SentinelLabs:

Cyber360 News

Cyber360 News

Next Post
Cisco fixes critical issue in Cisco Firepower Management Center

Cisco fixes critical issue in Cisco Firepower Management Center

Recent Posts

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

Twitch’s Entire Critical Data Leaked, Includes Streamer Earnings, Source Code

October 6, 2021
Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

Former U.S. Security Firm Helped The UAE Carry Out “Karma” iMessage Hack: MIT Tech Review

October 1, 2021
Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

Facing “This App Has Been Blocked For Your Protection” Issue? Here’s How You Can Fix It

October 1, 2021

Whats New in Kali Linux?

September 14, 2021

Kali Linux 2019.3 Release (CloudFlare, Kali-status, metapackages, Helper-Scripts & LXD)

September 14, 2021

Kali Linux 2021.3 Release (OpenSSL, Kali-Tools, Kali Live VM Support, Kali NetHunter Smartwatch)

September 14, 2021

Kali Linux 2018.4 Release

September 14, 2021

Kali Linux 1.0.5 and Software Defined Radio

September 14, 2021

Kali Tools Website Launched, 1.0.9 Release

September 14, 2021

Kali Linux Dojo at Black Hat Vegas 2016

September 14, 2021

Category

Site Links

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

About Us

We bring you the best Premium WordPress Themes that perfect for news, magazine, personal blog, etc. Check our landing page for details.

© 2019 Cyber360 News - Powered by WebSensePro

No Result
View All Result
  • Home
  • Security
  • Data Breach
  • Cyber Attacks
  • Cyber Security
  • Cyber Crime
  • Contact Us

© 2019 Cyber360 News - Powered by WebSensePro

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In