By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Digital TrustDigital TrustDigital Trust
  • Cybersecurity
    • Incident response and recovery
    • Network security
    • Phishing attacks and social engineering
    • Malware and viruses
    • Cloud security
  • Emerging Tech
    • Quantum computing
    • Artificial intelligence and machine learning
    • Blockchain technology
    • Internet of Things (IoT)
    • Augmented and virtual reality
  • Data privacy
    • GDPR compliance
    • Data protection laws and regulations
    • Data breaches and cyber attacks
    • Privacy policies and terms of service
    • User consent and data sharing
  • Business
    • Cyber insurance
    • Cybersecurity budgeting
    • Risk management and assessment
    • Digital trust and brand reputation
    • Investment and funding in cybersecurity companies
  • Compliance
    • PCI DSS compliance
    • HIPAA compliance
    • GDPR compliance
    • CCPA compliance
    • Cybersecurity laws and regulations
  • Research Center
Reading: Evolving Threat in Cybersecurity: BBTok Malware Crafts Unique Payloads for Users
Share
Notification Show More
Font ResizerAa
Digital TrustDigital Trust
Font ResizerAa
  • Cybersecurity
    • Incident response and recovery
    • Network security
    • Phishing attacks and social engineering
    • Malware and viruses
    • Cloud security
  • Emerging Tech
    • Quantum computing
    • Artificial intelligence and machine learning
    • Blockchain technology
    • Internet of Things (IoT)
    • Augmented and virtual reality
  • Data privacy
    • GDPR compliance
    • Data protection laws and regulations
    • Data breaches and cyber attacks
    • Privacy policies and terms of service
    • User consent and data sharing
  • Business
    • Cyber insurance
    • Cybersecurity budgeting
    • Risk management and assessment
    • Digital trust and brand reputation
    • Investment and funding in cybersecurity companies
  • Compliance
    • PCI DSS compliance
    • HIPAA compliance
    • GDPR compliance
    • CCPA compliance
    • Cybersecurity laws and regulations
  • Research Center
Follow US
© 2024 Digital Trust, a Talk About Tech brand. All rights Reserved.
Digital Trust > Cybersecurity > Malware and viruses > Evolving Threat in Cybersecurity: BBTok Malware Crafts Unique Payloads for Users
Malware and viruses

Evolving Threat in Cybersecurity: BBTok Malware Crafts Unique Payloads for Users

TechAdmin
Last updated: September 22, 2023 8:54 am
TechAdmin 2 years ago
Share
BBTok Banking Malware Crafts Unique Payloads for Users
SHARE

Understanding the Threat of BBTok Banking Malware

When it comes to digital threats, BBTok banking malware holds a prominent place, specifically designed and deployed by cybercriminals. It is focused on capturing sensitive financial information from potential victims’ computers or mobile devices. The primary targets typically are:

Contents
Understanding the Threat of BBTok Banking MalwareThe Emergence of BBTok Banking MalwareBBTok’s Innovative Tools and Techniques
  • Login credentials
  • Banking information

The sophistication level of these malware variants is alarmingly high, utilizing advanced techniques that include:

  • Keylogging
  • Web injection
  • Evasive mechanisms

Recently, notable findings from Check Point Research have uncovered a currently active campaign from BBTok banker in Latin America, targeting users in Brazil and Mexico using unique Living off the Land Binaries (LOLBins) infection methods.

The Emergence of BBTok Banking Malware

Unveiled in 2020, BBTok made a notable mark in Latin America. It primarily infiltrates networks via the following methods:

  • Fileless attacks
  • Process control operations
  • Manipulating clipboard data
  • Creating counterfeit login pages

Since its inception, BBTok has continuously evolved. For instance, it has made a significant shift from deploying infections via email attachments to utilizing phishing links.

BBTok offers cybercriminals remote access, mimicking the interfaces of over 40 banks within Mexico and Brazil, identifying their victims by examining their browser tabs.

BBTok focuses on duplicating banking interfaces, fooling users into revealing sensitive financial and personal information. It’s particularly interested in two-factor authentication (2FA) codes which are key to account takeovers.

Coded in Delphi, BBTok generates custom faux interfaces matching victim screens and bank forms using Visual Component Library (VCL). Moreover, it efficiently scours for Bitcoin-related data on the infected devices.

For orchestrating their scams efficiently, BBTok operators deploy a process initiating from the user clicking a malicious link, triggering a payload download designed for the user.

BBTok’s Innovative Tools and Techniques

Payloads were seen as obfuscated utilizing a technique referred to as Add-PoshObfuscation. The infection chain has two variations, both employing DLLs possessing similar names. Notably, one of them, ‘Kammy’, is an obfuscated loader for BBTok, which leads to the banking payload and additional software introduction

The recent analysis has uncovered ongoing campaigns with over 150 unique links in the SQLite database, suggesting that the threat might be bigger than it seems.

BBTok is considered elusive, with remarkable persistence and innovative techniques employed for delivery. It poses a serious challenge for cyber security researchers to adapt against these constantly evolving threats.

What are your thoughts on the ongoing risks with BBTok? Share your insights or experiences in the comments below.

You Might Also Like

Snake Cyber Espionage Tool Neautralised by the U.S Government

The Rise of Pikabot Cyber Threat, How is Sophos Fighting Back?

Beware of the Fake Cryptocurrency Trap

5 Proven Ways to Defend Against Malware Attacks

Sinister Malware Targets Discord Users to Hijack Cryptocurrency Wallets

Share This Article
Facebook Twitter Email Print
Previous Article CapraRAT Malware Takes Over Your Android Devices via YouTube Beware: The Sinister Side of YouTube – CapraRAT Malware Takes Over Your Android Devices
Next Article Cybercrime Ecosystem: Ransom Payments Dilemma Explored The Cybercrime Ecosystem and the “Godfather” Dilemma: To Pay or Not to Pay Ransom?
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts

Barracuda PhishLine Reeling You Away from Cyber Attacks

By Josh Hatton 3 Min Read

New Emotet Variant Ravages Banking Sector: Financial Institutions on High Alert

By Conal Cram 2 Min Read

Microsoft Under Fire for Data Sharing Practices with Government Agencies

By Conal Cram 2 Min Read

Beware: Microsoft Teams Users Under Siege by New Phishing Attack

By Conal Cram 2 Min Read

From our research center

KnowBe4 Africa (Pty) Ltd

10 Questions Every CISO Should Ask About AI-Powered Human Risk Management Tools

AI is transforming security awareness—but how much is marketing hype versus genuine value for your organisation? Human risk management (HRM) and security awareness vendors of...

Read content
about us

Our dedicated team of experts and journalists brings in-depth analysis, breaking news, and comprehensive reports from around the globe.

Useful links

  • About us
  • Contact us
  • Research Center
  • Disclaimer
  • Terms & Conditions
  • Privacy

Trending topics

  • Cybersecurity
  • Emerging technologies
  • Data privacy
  • Regulations and compliance
  • Digital trust and brand reputation

Find Us on Socials

© 2024 Digital Trust, a Talk About Tech brand. All rights Reserved.
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?