Trick 'Em - Part 6

Trick 'Em - Part 6

Mateo Cruz leaned forward, the dim glow of his monitor highlighting the tension in his face. The TrickMo sample Peter had sent him was unpacked and sprawled across multiple screens. Strings of obfuscated code, hidden logic, and precisely engineered exploits stared back at him.

“I didn’t just help build this monster,” he thought grimly. “I gave it running shoes and directions.”

?He sighed, the memories of his past work with the malware creeping into his thoughts. TrickMo wasn’t just another banking trojan anymore, it was a culmination of everything he once helped design, taken to a level he never imagined.

“This isn’t the TrickMo I left behind,” Mateo muttered. He opened his notes and began dictating into his headset. “Peter, this new variant is more than just an update, it’s an overhaul. Let’s start with their use of JSONPacker.”

“Go on,” Peter’s voice came through the line.

Mateo typed as he spoke. “They’re using JSONPacker to compress and encode critical components of the malware into a single JSON object. But here’s the difference, it’s dynamically unpacked only at runtime, and only under specific conditions. That means the payload doesn’t exist in a static, detectable form during installation. It’s invisible until it activates.”

“How’s that different from other trojans?” Peter asked.

“It’s not just about staying hidden,” Mateo explained. “The payload is modular. JSONPacker lets them add or remove functionality on demand, tailoring the malware to specific targets. Combine that with their use of evasion techniques, like sandbox detection and timing delays, and you’ve got something that’s not just hard to analyze, it’s nearly impossible to predict.”

He switched screens, pulling up logs of TrickMo’s activity during testing. “Now, here’s where they’ve taken things to the next level: account takeovers and on-device fraud. Other trojans typically rely on remote servers to control the victim’s account. TrickMo doesn’t need to…it performs everything directly on the device. That’s what makes it so dangerous.”

Peter was quiet for a moment. “Walk me through it.”

Mateo sighed, pulling up a flowchart he’d sketched earlier. “The malware starts by enabling accessibility services, giving it full control over the device. Once it detects the user opening a banking app, it overlays the login screen with a near-perfect replica. The user thinks they’re logging in as usual, but TrickMo intercepts the credentials and sends them to the attackers in real time.”

“And the fraud?” Peter prompted.

“It happens instantly,” Mateo continued. “TrickMo maintains the session in the background. It intercepts OTPs, auto-approves transactions, and even alters app settings to bypass security prompts. The user has no idea it’s happening, they’re just locked into the illusion that everything is normal.”

“And all this is happening locally, on the device?”

“Exactly,” Mateo confirmed. “That’s the genius of it. By executing fraud directly on the victim’s device, TrickMo avoids triggering many of the red flags that banks use to detect remote access or suspicious activity. From the bank’s perspective, it looks like legitimate user behavior.”

Peter’s voice hardened. “What about the infrastructure? Anything we can target?”

Mateo opened another window, showing a network map of TrickMo’s communications. “They’re using fast-flux DNS for their command-and-control servers. Every time you block one, another one comes online. But here’s the twist, they’re leveraging infected devices as part of their infrastructure. Some of the compromised devices aren’t just victims, they’re acting as nodes to host the overlay templates and relay data.”

Peter groaned. “Decentralization. That makes it harder to take down.”

“Much harder,” Mateo agreed. “And the stolen data? It’s routed to IPFS nodes, where it’s replicated across a decentralized network. Once it’s uploaded, it’s virtually impossible to retrieve or delete. Credentials, transaction details, personal data, it’s all out there, permanently.”

Peter paused. “What’s the play, Mateo? How do we hit back?”

Mateo leaned back, considering the question. “Start by disrupting their fast-flux DNS. It won’t stop them entirely, but it’ll slow them down. Then target the devices acting as nodes, cutting off their ability to host the overlays will weaken their infrastructure. Finally, educate users about this threat. TrickMo’s reliance on social engineering is key to its success. If users recognize fake updates and avoid granting unnecessary permissions, it’ll cripple their infection rates.”

“And the compromised devices?”

Mateo hesitated. “There’s no easy fix. The safest move is to revoke trust for those devices entirely. Treat them as compromised and block their access to banking systems. It’ll inconvenience users, but it’s better than letting TrickMo continue unchecked.”

Peter’s voice softened. “Thanks, Mateo. I’ll loop you in on our next steps.”

“Is there anything else we should know?”

“Hello Mateo, are you there?” Peter called out anxiously two more times before the phone line disconnected.???


If you missed Part 1, Part 2, Part 3, Part 4 and Part 5 please catch up.

Did Mateo meet your expectations? Has he done enough to clean up a mess he helped create? If TrickMo is always one step ahead, do you think this battle is already lost? Is blocking compromised devices too extreme? Would you be okay with losing access to your banking app if your phone was flagged? Share your thoughts in the comment section.

Comment | Share | Repost

? 2025-2090 ByPassed. All rights reserved. You may share or link to content from ByPassed, but please provide proper attribution and do not modify the original content without permission.

#cybersecurity #Bypassed #truecrime


Shakirat Ige

ICT Engineer (Infrastructure/Security)

4 天前

Wow yet another wonderful episode…Mateo is a whiz ??…U build something, u might be able to fix it.This shows the importance of knowing the basics. I just watched a new movie on Netflix called Zero day. I wondered how almost all devices were attacked. A social media app company was brought on board, like meta. Because almost everyone has an app from that company on their phone, that already compromised 80% of the devices, and it could move from one device to another through Bluetooth, airdrop, or just devices that are on the same network. Thank you ma’am. You making us think ??

回复
Gamuchirai M. M.

SOC Analyst| Security Engineer | Incident Responce| DFIR | Front-End Developer | Security Analyst| OpenSource Contributor | CyberGirl 4.0

6 天前

I feel like Mateo knows more, and he can do more actually, . Its not over but I understand that by the time they fully understand its strength and are able to bring it down, lots of people will be affected, soo much damage will be done, I think also overthinking, sometimes the answer might just be in their face or something soo basic that they overlooking. No, that will be a nightmare, nowadays a lot is connected with the bank it is not just funds. So no

回复
Gamuchirai M. M.

SOC Analyst| Security Engineer | Incident Responce| DFIR | Front-End Developer | Security Analyst| OpenSource Contributor | CyberGirl 4.0

6 天前

The is this saying " Don't build a house without a solid foundation" Truly knowing the foundation/basics in any field is such an underrated thing cause we rushed to not think how those basics could be something exploited

回复
Gabriel Vincent

IT Support Specialist | Security Researcher

1 周

The core challenges revolve around Mateo's reactive security posture, a pursuit of unrealistic zero-tolerance, the human element within cybersecurity, and the need for aggressive containment of decentralized threats like TrickMo. Mateo's current approach focuses on responding to incidents rather than anticipating and preventing them, a strategy ill-suited for evolving threats. Furthermore, the aspiration for absolute security, while admirable, is unattainable; therefore, a shift towards containment and disruption is crucial. The unwitting or opportunistic support of individuals for TrickMo necessitates a proactive engagement through cyber threat evangelism, aiming to turn these individuals against the operation. Mateo Cruz will also need to actively evangelize, working to turn those who once weaponized Trickmo against the general public and the banking sector into allies in the fight against it. Given his own history as someone who helped weaponize Trickmo, he is well-suited for this role. By taking on this mission, he won’t just reclaim his reputation—something he can’t achieve by simply sitting behind a desk—but will also help dismantle the very system he once contributed to. Credit: Bypassed for “Trick Em Part 6.”

回复
Aisha Olayinka Yusuf

Cybersecurity Analyst | GRC | Graphics Designer

1 周

I like the idea of creating awareness about this threat. It would go a long way in solving this. As I read through, I was glad and excited that Mateo is helping but then the last paragraph threw me into suspence, gave me chills actually ????. Having questions like, why did Mateo stop responding? Why did did he go quiet all of a sudden? Why did the phone line get disconnected suddenly? The suspense Ma'am Confidence Staveley ???? Next Thursday, be here soon??

回复

要查看或添加评论,请登录

Confidence Staveley的更多文章

  • Trick 'Em - Part 5

    Trick 'Em - Part 5

    The bar was buzzing with the after-work crowd, laughter and clinking glasses filling the air. Zara and Peter had…

    23 条评论
  • Trick 'Em - Part 4

    Trick 'Em - Part 4

    Peter Jenkins rubbed his head as he hung up the call with Zara. Her voice had been edged with desperation, a tone he…

    48 条评论
  • Trick ‘Em - Part 3

    Trick ‘Em - Part 3

    Peter stood at the front of the briefing room, marker in hand, outlining the complexities of TrickMo’s latest…

    44 条评论
  • Trick 'Em - Part 2

    Trick 'Em - Part 2

    Zara sat at her desk, flipping through the latest threat intelligence report, while her mind wondered. She wanted to…

    88 条评论
  • Trick Em - Part 1

    Trick Em - Part 1

    Tom Reynolds wiped sweat from his brow, his eyes darting between the glowing spreadsheets on his dual monitors. The…

    134 条评论
  • Can AI read your mind? Its an emphatic future YES... Here's what you should know.

    Can AI read your mind? Its an emphatic future YES... Here's what you should know.

    Generative AI can now be used to read your mind with very impressive accuracy. This technology is coming to simple…

    51 条评论
  • From CyberGirls Fellowship to being trained in Miami : My Deep Dive into the World of Industrial Control Systems

    From CyberGirls Fellowship to being trained in Miami : My Deep Dive into the World of Industrial Control Systems

    “Wow! This is a great opportunity! I will be training with prominent and diverse professionals from all over the world!…

    17 条评论
  • Adidas wants a brand partnership with me...

    Adidas wants a brand partnership with me...

    I know you've been taught many times about phishing and you've been told that one of the signs to look for is a generic…

    31 条评论
  • She got an invoice...may be not!

    She got an invoice...may be not!

    What I like most about writing these newsletters every week is hearing from you and seeing how much more confident you…

    7 条评论
  • Oldie Goldie...$30 Million is coming my way!

    Oldie Goldie...$30 Million is coming my way!

    I woke up so lucky today! "Wow, is this how people wake up wealthy?", I thought to myself. How else could I explain…

    13 条评论