The United States, in coordination with the United Kingdom, sanctioned eleven more individuals who are members of the Russia-based Trickbot cybercrime group. The sanctions were provided by the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC).
Among the sanctioned individuals, there are administrators, managers, developers, and coders who have materially supported the operations of the Trickbot group.
“Today’s targets include key actors involved in management and procurement for the Trickbot group, which has ties to Russian intelligence services and has targeted the U.S. Government and U.S. companies, including hospitals.” reads the announcement made by the U.S. Department of the Treasury.
TrickBot is a popular Windows banking Trojan that has been around since October 2016, its authors have continuously upgraded it by implementing new features, including powerful password-stealing capabilities.
TrickBot initially partnered with Ryuk ransomware which used it for initial access in the network compromised by the botnet. Then Ryuk was replaced by Conti Ransomware gang who had been using Trickbot for the same purpose.
In 2021, the Conti gang used in exclusive the TrickBot to achieve initial access to the network of organizations worldwide.
Below is the list of sanctioned individuals:
This included targeting the U.S. Government and U.S. companies.
The investigation conducted by the UK National Crime Agency (NCA) revealed that the group extorted at least $180 million from victims globally, and at least £27 million from 149 UK victims. The ransomware operation also targeted UK hospitals, schools, local authorities and businesses.
“These cyber criminals thrive off anonymity, moving in the shadows of the internet to cause maximum damage and extort money from their victims.” UK Foreign Secretary James Cleverly said.
“Our sanctions show they cannot act with impunity. We know who they are and what they are doing.
By exposing their identities, we are disrupting their business models and making it harder for them to target our people, our businesses and our institutions.”
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Trickbot)