Trick 'Em - Part 4

Trick 'Em - Part 4

Peter Jenkins rubbed his head?as he hung up the call with Zara. Her voice had been edged with desperation, a tone he didn’t often associate with the unshakable CISO. TrickMo was back, and from what Zara had described, it wasn’t just their usual attacks. Customers were being hit hard, losing their life savings and the overlay tactic she mentioned aligned perfectly with the patterns his team had been unraveling all day.

He turned back to his team. “Alright, Maria, Michael…update. Zara just confirmed active TrickMo infections targeting her bank’s customers. She says the malware’s hitting their mobile app with overlay attacks as well as remote control of infected devices to perform onDevice Fraud.

“What more have you uncovered? We need to work fast!” said Peter, while staring at the log of? attacks on his monitor, his mind racing through possibilities. TrickMo’s capabilities were unlike anything the FBI Cyber Investigation Unit had seen before. The malware's latest tactic was particularly insidious: dynamic HTML overlay attacks.

“Explain the overlays again,” Peter said, his tone sharp, as he turned to Maria, the junior analyst.

Maria’s fingers flew over her keyboard, pulling up a real-time demonstration. “The malware detects when a user launches a specific banking app. Instead of letting them see the legitimate login page, it mimics an identical, fake version. The user doesn’t know the difference. They input their credentials, and TrickMo forwards those to the attackers while passing the session back to the real app.”

“Seamless,” Peter muttered, his brow furrowing. “It doesn’t just intercept OTPs; it captures everything before the user even realizes they’re compromised.”

“That’s not all,” Maria continued. “The fake interfaces aren’t static. They adapt to match the branding of the targeted bank, pulling elements dynamically from the app itself. It’s like the malware knows exactly what the user expects to see.”

Peter leaned forward, his voice tense. “How are they deploying it? Does this tie back to the accessibility services abuse?”

Michael, another analyst, jumped in. “It’s all connected. Once the malware activates accessibility services, it gains full control over the screen. It can dismiss notifications, capture keystrokes, and, most importantly, overlay content. This isn’t some crude phishing attempt. It’s precise, targeted fraud.”

“And the victims?” Peter asked.

Michael hesitated. “They never see it coming. By the time they realize their accounts are drained, the money has already passed through mule accounts and into crypto wallets. The operators have perfected the kill chain.”

Maria turned the monitor toward Peter. “This variant isn’t just sitting on devices quietly anymore. It’s part of their larger infrastructure. They’re leveraging the compromised devices as nodes for overlay hosting, making it even harder to track.”

Peter exhaled sharply. “So we’re dealing with TrickMo as a distributed operation. It’s not just malware, it’s a network.”

The room fell silent as Peter stared at the sprawling attack map on the monitor. He could see the threads tying together: obfuscation with JSONPacker, accessibility abuse, command-and-control servers with fast-flux DNS, and now these advanced overlay attacks. TrickMo was evolving into something far more dangerous than anyone had anticipated.

Peter stared at the network map glowing on the screen, the web of connections spiraling out from a single origin. The evidence pointed to a new level of organization and scale.

Seeing Peter’s frustration Maria couldn't help but blurt, “we need someone who understands TrickMo’s architecture. Someone who’s worked on it to make significant progress in bringing this group down.”

Peter stiffened. “You’re suggesting Mateo Cruz?”

There was a pause in the room. Mateo’s name always carried weight. Once a key figure in TrickMo’s original development team, Mateo had turned away from the criminal world after his arrest, cooperating with law enforcement in exchange for leniency. His detailed insights into TrickMo’s inner workings had been instrumental in dismantling earlier operations. But bringing him in meant reviving old scars for everyone.

“Mateo is the best option,” Maria continued. “He knows how this works from the inside out. If anyone can help us exploit its vulnerabilities, it’s him.”

Peter leaned back, his jaw tight. Mateo’s journey from cybercriminal to redemption was well-documented, but his presence often brought tension. The man had a sharp wit and undeniable charisma, but his past lingered like a shadow. Peter had seen him charm rooms while privately wrestling with guilt over the lives his work had upended. Mateo’s collaboration had saved countless systems from TrickMo’s grasp, but this new campaign was different - larger, more sinister.

Peter turned sharply to Maria, his voice firm. “We don’t have a choice. Get Mateo on the line.”

Maria nodded, already reaching for her phone. In her mind, she replayed Mateo’s last words to her during a rare moment of vulnerability: “I can’t undo what I’ve done, but I can help stop others from making the same mistakes.”

Peter looked back at the network map on his screen, the sprawling web of TrickMo infections spiraling outward. They had no time to waste.?


If you missed Part 1, Part 2 and Part 3, please catch up.

If you were in Peter's shoes, would you trust Mateo Cruz, knowing his past? Do you understand how the dynamic HTML overlay attack works? If your bank was a target of such an attack, do you think you could tell the fake from the original? In your opinion, should law enforcement trust former cybercriminals to help stop cybercrime?

Comment | Share | Repost

? 2025-2090 ByPassed. All rights reserved. You may share or link to content from ByPassed, but please provide proper attribution and do not modify the original content without permission.

#cybersecurity #Bypassed #truecrime


Ogochukwu Asogwa

Cybersecurity Analyst (SOC Tier 1) | ISC2 CC |

3 天前

This is the first time hearing about dynamic html overlay attack and my first thought is why did such a thing even exist? This isn’t even phishing, i don’t expect users to suspect that the bank apps they frequent in their mobile device isn’t the real one. I also can’t help but wonder how the creators of this evolved TrickMo pick their victims? Did they just create a fake chrome and attacked everyone who clicked or was there some sort of SEO engineering in selecting victims?

回复
Gamuchirai M. M.

SOC Analyst| Security Engineer | Incident Responce| DFIR | Front-End Developer | Security Analyst| OpenSource Contributor | CyberGirl 4.0

6 天前

Good to be back and able to read, was on reader's block It is so tense, is this what it is actually like being CTI? I will trust Mateo, I read about this greatest hacker Kevin Mitnick, and I believe that Mateo is a great asset and should help because he is skilled and this is something his familiar with. Also, I understand the risk, but how will they know till they give him a chance? In my eyes his like Kevin, he got to make such a great impact and teach a lot of organizations about security issues. So Mateo for me , he must be on board, his skilled, and sounds like he really does want to change his past.

回复
Bridget Stewart

Social Worker (worldwide) neuro diverse, disabled (CPTSD). musician (Billy Whims, Red Mum, bl@ck be@n, et. al.), writer, artist, activator, activist.

2 周

F yeah

回复
Bridget Stewart

Social Worker (worldwide) neuro diverse, disabled (CPTSD). musician (Billy Whims, Red Mum, bl@ck be@n, et. al.), writer, artist, activator, activist.

2 周

Well said Confidence ??????????

回复
Afam ODOH (mMBA, CCDF)

Auto Sales * Luxury Transfers * Hotel Services. Cyber/Information Security. Nigeria's Representative at the 2005 World Expo in Aichi Japan - (Bilingual-English/Japanese)

2 周

There's no doubt that the Shoes and Caps that Peter is wearing are both heavy and vulnerably exposed. The continuous reliance on Mateo and overtapping from his Criminal mindset might backfire one day. Beware of always obtaining loan from an armed robber!! Let's invest more in Training and Retraining . And also more attention on the "Separation of duties"policy.

要查看或添加评论,请登录

Confidence Staveley的更多文章

  • Trick 'Em - Part 6

    Trick 'Em - Part 6

    Mateo Cruz leaned forward, the dim glow of his monitor highlighting the tension in his face. The TrickMo sample Peter…

    27 条评论
  • Trick 'Em - Part 5

    Trick 'Em - Part 5

    The bar was buzzing with the after-work crowd, laughter and clinking glasses filling the air. Zara and Peter had…

    23 条评论
  • Trick ‘Em - Part 3

    Trick ‘Em - Part 3

    Peter stood at the front of the briefing room, marker in hand, outlining the complexities of TrickMo’s latest…

    44 条评论
  • Trick 'Em - Part 2

    Trick 'Em - Part 2

    Zara sat at her desk, flipping through the latest threat intelligence report, while her mind wondered. She wanted to…

    88 条评论
  • Trick Em - Part 1

    Trick Em - Part 1

    Tom Reynolds wiped sweat from his brow, his eyes darting between the glowing spreadsheets on his dual monitors. The…

    134 条评论
  • Can AI read your mind? Its an emphatic future YES... Here's what you should know.

    Can AI read your mind? Its an emphatic future YES... Here's what you should know.

    Generative AI can now be used to read your mind with very impressive accuracy. This technology is coming to simple…

    51 条评论
  • From CyberGirls Fellowship to being trained in Miami : My Deep Dive into the World of Industrial Control Systems

    From CyberGirls Fellowship to being trained in Miami : My Deep Dive into the World of Industrial Control Systems

    “Wow! This is a great opportunity! I will be training with prominent and diverse professionals from all over the world!…

    17 条评论
  • Adidas wants a brand partnership with me...

    Adidas wants a brand partnership with me...

    I know you've been taught many times about phishing and you've been told that one of the signs to look for is a generic…

    31 条评论
  • She got an invoice...may be not!

    She got an invoice...may be not!

    What I like most about writing these newsletters every week is hearing from you and seeing how much more confident you…

    7 条评论
  • Oldie Goldie...$30 Million is coming my way!

    Oldie Goldie...$30 Million is coming my way!

    I woke up so lucky today! "Wow, is this how people wake up wealthy?", I thought to myself. How else could I explain…

    13 条评论

社区洞察

其他会员也浏览了