{"id":382,"date":"2025-04-23T19:59:47","date_gmt":"2025-04-23T19:59:47","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/?p=382"},"modified":"2025-04-23T19:59:47","modified_gmt":"2025-04-23T19:59:47","slug":"cs-462-term-project","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/23\/cs-462-term-project\/","title":{"rendered":"CS 462 Term Project"},"content":{"rendered":"\n<p>Cybersecurity in the Real World<\/p>\n\n\n\n<p><br>The world has begun entering its technologically advanced age, where many of its<br>different countries and people are essentially completely reliant on their devices. Some examples<br>being the invention and development of artificial intelligence, the exposure of the people to<br>media like Tiktok, X, Instagram, and Snapchat, companies moving their information from paper<br>to digital, and even just access to the internet. Because of this, cybersecurity is more important<br>than ever. Especially since everyone wants their information to remain private.<br>Of course even with cybersecurity, there are always risks of breaches or exposures. These<br>risks include anything that can affect the confidentiality, integrity, and availability of your data<br>like malware, social engineering, denial-of-service attacks, ransomware, phishing, and zero day<br>exploits. While some of these categories are specific, a lot of them include a lot of important and<br>dangerous threats.<br>Malware for example, includes viruses, worms, trojans, adware, and spyware all which<br>are typically used to access your system and either steal, encrypt, or damage your data. A<br>specific malware I would like to talk about is actually a trojan that was originally created to steal<br>financial information. It eventually turned into a \u201chighly modular, multistage malware that<br>provides its operators a full suite of tools to conduct a myriad of illegal cyber activity\u201d according<br>to the Cybersecurity &amp; Infrastructure Security Agency (CISA 2021). This trojan was called<br>TrickBot and it was first discovered back in 2016.<br>Because TrickBot is a trojan, it gains access to people&#8217;s networks by spear-phishing,<br>using emails with it in them or when someone downloads an attachment or clicks on a link that is<br>already infected with it. The problem with this malware is that while it spreads through your system and network it can alter your data by encrypting it, stealing it, and even deleting it.<br>(Baker 2023).<\/p>\n\n\n\n<p><br>TrickBot Malware<\/p>\n\n\n\n<p><br>Throughout the time that TrickBot was active it affected millions of people around the<br>world. Not only did it affect people but it also affected hospitals, schools, and businesses all<br>over. In the U.S alone it affected people within 47 of its 50 states and a Russian cybercrime<br>organization, supposedly called Wizard Spider, has been charged with initiating many of these<br>attacks (Office of Public Affairs 2023). According to Wallarm, the losses in money across the<br>different countries surpassed the millions. With North America topping it with over 1 billion<br>dollars lost (Ilyin 2025).<br>One TrickBot attack actually happened in 2020 during one of the peaks of COVID and<br>included 3 hospitals where the computers and devices all went down because they were targeted<br>by one of the Russian malware gangs, Wizard Spider. Their goal was to get busy hospitals during<br>COVID issues and that to get their systems back up they would pay a ransom but after the arrests<br>of some of the members of Wizard Spider, the attacks died down (Burgess 2022).<br>The trojan, once it is into your system, can check every website entered. Once you enter<br>the site for a targeted website, in this case any bank website or website related to financial data, it<br>will essentially be able to get the information of any logins you do or any bank information that<br>pops up when you are on the website. According to Wallarm, \u201cThis stolen information can<br>subsequently be auctioned on the darknet or used for future malicious endeavors\u201d (Ilyin 2025).<br>The Total Fraud Protection channel on YouTube actually has a video detailing how TrickBot<br>works and even shows that with the targeted websites it can still have the https and a valid security certificate but the code for the website is longer and states that it is copying the<br>credentials from the website (2017).<br>Not only can TrickBot do that but according to Crowdstrike it has the ability to install<br>backdoors in your network and system so it can continuously access it, as well as disable any<br>antivirus tools you may have installed and it adapts so it is often hard to trace or even know your<br>system is infected with it. TrickBot can also communicate with the command and control server<br>(C2) which allows it to create bots that can be scattered around your systems. Because it is a<br>trojan with multiple modules, each of them have different tasks and abilities. The CoredII<br>module is one of the main ones and is used for packing and encrypting information and data.<br>InjectDII is a module that is used for watching your activity on financial websites and stealing<br>the information. TabDII is a module used for EternalRomance exploits to spread the malware<br>further (CIS Blog 2021). Since TrickBot can get rid of a lot of antivirus software, it is actually<br>known for being able to disable Windows Defender. On top of that it can also install and<br>download other types of malware onto your device and have it attack your system or demand<br>ransom like the ransomware Wizard Spider calls Ryuk and Conti (Baker 2023).<\/p>\n\n\n\n<p><br>Defense and Mitigation<\/p>\n\n\n\n<p><br>Because TrickBot became so adaptive it is very difficult to realize your network is<br>infected. The best way to protect yourself and your devices from TrickBot is to limit the access<br>to the network so there is a less likely chance of it getting affected. Having access to multi-factor<br>authentication helps with only giving the right people access too. Training associates at your<br>company is also a good way to prevent the systems from getting affected because then they will<br>know when sites or attachments look suspicious and if they do get infected they will know what<br>to look for and be able to quickly report it. To help prevent social engineering attempts within companies you can mark outside emails as external so your associates are extra cautious. If you<br>do have systems that are infected, separating them from the other networks will help keep the<br>malware from spreading as well (Baker 2023). According to Wallarm, companies like Symantec,<br>McAfee, and Kaspersky have designed antivirus software that can be used to find and get rid of a<br>TrickBot and overall companies around the world have started to decrease the amount of<br>vulnerabilities their systems may have to keep TrickBot from being able to breach them (Ilyin<br>2025).<br>According to the CISA, they developed a method of detecting TrickBot signatures in<br>network activity, which makes sense given that in the Total Fraud Protection video they show<br>that the codes for the websites say what they are for and are noticeably different from the<br>original website. The video also mentions that client lists should be helpful for determining if<br>there are any malicious code injections in the sites you may enter (Office of Public Affairs 2023<br>&amp; 2017).<br>Although TrickBot started in 2016 according to my research, a lot of the attacks<br>happened during the COVID years because with all the stress around the world it was easier to<br>target vulnerable places like the hospitals mentioned earlier. But now, in 2025 TrickBot is still<br>around and still continuously evolving, becoming better and smarter. So our methods of<br>detecting it need to evolve and become stronger too.<br>The problem with today\u2019s society is that due to the fact that the world has been managed<br>by what is going on in the media, I think more people would fall for the social engineering aspect<br>of the TrickBot malware. So, fake emails from companies advertising popular products could<br>have someone unknowingly fall for it and click on a link or infected attachment. Because of this,<br>I believe it is essential for these social media companies to educate their users about these possible threats to their safety and security so they are alert when it comes to these threats.<br>Although there still aren\u2019t very many ways to detect TrickBot infections, the methods of trying to<br>prevent it have grown as what TrickBot can do changes. So, make sure you look out for<br>manipulative or fake emails, infected web browsers, and phishing traps.<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p><br>Baker, Kurt. \u201cWhat Is TrickBot Malware?\u201d CrowdStrike, 2 Oct. 2023,<br>www.crowdstrike.com\/en-us\/cybersecurity-101\/malware\/trickbots\/.<br>\u201cBlog: TrickBot: Not Your Average Hat Trick &#8211; a Malware with Multiple Hats.\u201d CIS, Center for<br>Internet Security, 22 Apr. 2021, www.cisecurity.org\/insights\/blog\/trickbot-not-<br>your-average-hat-trick-a-malware-with-multiple-hats.<br>Burgess, Matt. \u201cInside Trickbot, Russia\u2019s Notorious Ransomware Gang.\u201d Wired, Conde Nast, 1<br>Feb. 2022, www.wired.com\/story\/trickbot-malware-group-internal-messages\/.<br>Fraud Protection, Total. \u201cHow Trickbot Works.\u201d YouTube, YouTube, 19 Sept. 2017,<br>www.youtube.com\/watch?v=2MUKoNcGo-8.<br>Ilyin, Stepan. \u201cDeciphering TrickBot: How It Works and How to Mitigate It.\u201d RSS, Wallarm, 5<br>Apr. 2025, www.wallarm.com\/what\/trickbot-<br>malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potentia<br>l,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergen<br>ce%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%<br>20tendencies.<br>\u201cMultiple Foreign Nationals Charged in Connection with Trickbot Malware and Conti<br>Ransomware Conspiracies.\u201d Office of Public Affairs | Multiple Foreign Nationals<br>Charged in Connection with Trickbot Malware and Conti Ransomware<br>Conspiracies | United States Department of Justice, 7 Sept. 2023. Updated 6 Feb.<br>2025, www.justice.gov\/archives\/opa\/pr\/multiple-foreign-nationals-charged-<br>connection-trickbot-malware-and-contiransomware#:~:text=According%20to%20court%20documents%20and,Attorney<br>%20General%20Merrick%20B.%20Garland.<br>\u201cTrickBot Malware: CISA.\u201d Cybersecurity and Infrastructure Security Agency CISA, 21 May<br>2021, www.cisa.gov\/news-events\/cybersecurity-advisories\/aa21-076a. <\/p>\n\n\n\n<p><a href=\"http:\/\/www.crowdstrike.com\/en-us\/cybersecurity-101\/malware\/trickbots\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.cisecurity.org\/insights\/blog\/trickbot-not-your-average-hat-trick-a-malware-with-multiple-hats\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.cisecurity.org\/insights\/blog\/trickbot-not-your-average-hat-trick-a-malware-with-multiple-hats\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.youtube.com\/watch?v=2MUKoNcGo-8\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wallarm.com\/what\/trickbot-malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potential,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergence%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%20tendencies\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wallarm.com\/what\/trickbot-malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potential,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergence%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%20tendencies\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wallarm.com\/what\/trickbot-malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potential,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergence%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%20tendencies\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wallarm.com\/what\/trickbot-malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potential,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergence%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%20tendencies\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.wallarm.com\/what\/trickbot-malware#:~:text=Investigating%20the%20Future:%20TrickBot%27s%20Potential,for%20the%20infamous%20malware%2C%20TrickBot.&amp;text=The%20emergence%20of%20TrickBot%20was,upon%20modern%20malware%20enhancement%20tendencies\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><a href=\"http:\/\/www.justice.gov\/archives\/opa\/pr\/multiple-foreign-nationals-charged-connection-trickbot-malware-and-conti-ransomware#:~:text=According%20to%20court%20documents%20and,Attorney%20General%20Merrick%20B.%20Garland\" target=\"_blank\" rel=\"noreferrer noopener\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity in the Real World The world has begun entering its technologically advanced age, where many of itsdifferent countries and people are essentially completely reliant on their devices. Some examplesbeing the invention and development of artificial intelligence, the exposure of the people tomedia like Tiktok, X, Instagram, and Snapchat, companies moving their information from paperto&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2025\/04\/23\/cs-462-term-project\/\">Read More<\/a><\/div>\n","protected":false},"author":27605,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":24},"categories":[24],"tags":[25],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/382"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/users\/27605"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"predecessor-version":[{"id":383,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/382\/revisions\/383"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}