TrickBot Gang Created a Custom Post-Exploitation Framework

Instead of relying on premade and well-known toolkits, the threat actors behind the TrickBot trojan decided to develop a private post-exploitation toolkit called PowerTrick to spread malware laterally throughout a network. […]

This post appeared first on Bleeping Computer
Author: Lawrence Abrams