Security researchers observed that TrickBot has begun using a User Account Control (UAC) bypass to quietly infect machines running Windows 10 without displaying any prompts.

According to Bleeping Computer, security researcher Vitali Kremez observed a new sample of TrickBot analyzing the machine’s OS upon execution. It used the CMSTPLUA UAC bypass if it determined that the machine was running Windows 7. If the computer was running Windows 10, the malware employed the Fodhelper UAC bypass.

Discovered in 2017, the Fodhelper UAC bypass uses C:\Windows\system32\fodhelper.exe, a legitimate Microsoft executable, to execute other programs with administrative privileges. The malware turned to this technique because of its ability to bypass UAC via the registry method. Subsequently, the Trojan used the bypass to launch itself on a machine running Windows 10 without displaying a UAC prompt. In so doing, it did not alert the user, allowing it to quietly discharge its malicious functions.

A Glimpse at TrickBot’s Recent History

The bypass described above is just the latest advancement in TrickBot’s ongoing development. Back in August 2019, for instance, Secureworks discovered that the Trojan had added the ability to solicit PIN codes from mobile customers. These codes could have then allowed the malware to access victims’ voice and text communications via SIM swap fraud.

Several months later, at the beginning of January 2020, SentinelLabs revealed that the malware had added a stealthy backdoor known as PowerTrick to its arsenal. It was just a few weeks later when Bleeping Computer detected an Emotet campaign targeting email addresses at the United Nations with secondary malware payloads such as TrickBot.

How to Defend Against a TrickBot Infection

Security professionals can help their organizations defend against a TrickBot infection by using penetration tests to reveal weak spots in their network defenses. They should also leverage security awareness training and simulated phishing engagements to bolster their email defenses. Doing so will help minimize the risks associated with one of TrickBot’s most common delivery vectors.

More from

$10.3 Billion in Cyber Crime Losses Shatters Previous Totals

4 min read - The introduction of the most recent FBI Internet Crime Report says, “At the FBI, we know ‘cyber risk is business risk’ and ‘cybersecurity is national security.’” And the numbers in the report back up this statement. The FBI report details more than 800,000 cyber crime-related complaints filed in 2022. Meanwhile, total losses were over $10 billion, shattering 2021's total of $6.9 billion, according to the bureau’s Internet Crime Complaint Center (IC3).  Top Five Cyber Crime TypesIn the past five years, the…

4 min read

How to Boost Cybersecurity Through Better Communication

4 min read - Security would be easy without users. That statement is as absurd as it is true. It’s also true that business wouldn’t be possible without users. It’s time to look at the big picture when it comes to cybersecurity. In addition to dealing with every new risk, vulnerability and attack vector that comes along, cybersecurity pros need to understand their own fellow employees - how they think, how they learn and what they really want. The human element — the individual and social factors that…

4 min read

Detecting Insider Threats: Leverage User Behavior Analytics

3 min read - Employees often play an unwitting role in many security incidents, from accidental data breaches to intentional malicious attacks. Unfortunately, most organizations don’t have the right protocols and processes to identify potential risks posed by their workforce. Based on a survey conducted by SANS Institute, 35% of respondents said they lack visibility into insider threats, while 30% said the inability to audit user access is a security blind spot in their organizations. In addition, the 2023 X-Force Threat Intelligence Index reported that…

3 min read

Poor Communication During a Data Breach Can Cost You — Here’s How to Avoid It

5 min read - No one needs to tell you that data breaches are costly. That data has been quantified and the numbers are staggering. In fact, the IBM Security Cost of a Data Breach estimates that the average cost of a data breach in 2022 was $4.35 million, with 83% of organizations experiencing one or more security incidents. But what’s talked about less often (and we think should be talked about more) is how communication — both good and bad — factors into…

5 min read