Your business’ toughest competition might be criminal. See why.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Huntress Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    ebooks
    ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Rapid Response: TrickBoot
Published:
December 2, 2020

Rapid Response: TrickBoot

By:
Annie Ballew
Share icon
Glitch effectGlitch effectGlitch effect

The TrickBot malware family has sustained its status as a worthy adversary in the world of cybersecurity since 2016. Even after a recent campaign aimed at taking down a significant chunk of TrickBot’s infrastructure by US Cyber Command in collaboration with a few major technology companies, TrickBot continues to power through making it a constant uphill battle for cybersecurity defenders and researchers.

Very recently, we’ve learned that TrickBot has unleashed yet another module in its growing arsenal specifically targeting firmware vulnerabilities — aptly named TrickBoot.

What is TrickBoot?

TrickBoot is new functionality within the TrickBot malware toolset capable of discovering vulnerabilities in firmware and enabling attackers to then read, write or even erase the firmware on the device.

Why is this significant?

Once malware is detected on a host, best practices recommend you to wipe the machine and restore from backup. Firmware persistence allows malicious actors to regain access even after the system is formatted.

This marks a significant step in the evolution of TrickBot. Firmware level threats carry unique strategic importance for attackers. By implanting malicious code in firmware, attackers can ensure their code is the first to run. Bootkits allow an attacker to control how the operating system is booted or even directly modify the OS to gain complete control over a system and subvert higher-layer security controls.

In addition, the ability to modify firmware gives attackers another piece of leverage: the threat of bricking a device — holding not only the data but also the physical asset for ransom.

Are my hosts infected with TrickBoot?

Huntress ThreatOps analysts collaborated with the Advanced Intelligence team and received early warning of this emerging threat. With this intel, we validated that no systems running Huntress were affected by the referenced tradecraft or indicators of compromise at the time of this blog. Additionally, we are performing a retrospective hunt against our archived data, dating back to the beginning of October 2020, to confirm whether any TrickBoot incidents were observed.

For non-Huntress partners, we recommend you keep your eyes peeled for randomly named scheduled tasks and services similar to “AdvancedLocTechnic” or “SystemTechGatService”. The presence of the RWEverything driver “RwDrv.sys” may also be an indicator of compromise. On systems prior to Windows 10, TrickBot stores its .DLL modules and configuration files within a random subdirectory in %APPDATA%. This provides an additional opportunity to find the statically named modules — like “injectDll32” or “injectDll64” — before the situation escalates.

How does it work and what can I do to mitigate?

Here’s what it looks like from an attack chain perspective:

Initial Access: TrickBot infections typically start with malicious emails containing the Emotet malware “dropper”. Investing in Email Security and User Awareness Training will help prevent this threat vector.

Persistence and Lateral Movement: After gaining access, TrickBot often creates a Scheduled Task to establish a foothold and then proceeds to escalate privileges and spread laterally. Using Huntress and minimizing administrative permissions and are worthwhile investments.

Post Exploitation: Additional malicious modules are downloaded once access is established. This is where the TrickBoot payload will be loaded to check for firmware vulnerabilities or write capabilities. Filtering tools may block access to known downloader C2 locations; in addition, good patching hygiene should extend to 3rd party software, firmware and UEFI/BIOS.

Persistence for Your Persistence: If write capabilities are available, TrickBoot now has an opportunity to implant UEFI/BIOS persistence, adding the ability to reinfect the device even after an OS wipe. Check out the links below for ongoing research about UEFI or firmware hacking.

Action: Once the stones are laid, the attacker’s objective ($$) is within arm’s reach. In most cases, we’re dealing with a ransomware attack — sometimes accompanied by data exfiltration and now the threat of bricking the machine. If attackers get through previous layers of defense, having earlier detection through Ransomware Canaries will allow you to respond faster and mitigate the spread of infection.

What is Huntress doing?

Over the past several years, Huntress has discovered and remediated over 14,000 TrickBot infections. This experience formed the foundation of our advanced detection capabilities and detailed remediation guidance. Between our existing Persistent Footholds service and our Managed Antivirus beta, partners have solid protection and early detection in place. To improve that security posture against TrickBoot, we’ve also created a new detector that hunts for the misuse of the legitimate RWEverything driver (rwdrv.sys)—and we’ll continue to monitor this situation.

Looking to Learn More about UEFI or Firmware Hacking?

Despite the new attention to firmware persistence, this threat vector has been documented and abused for nearly 15 years. As a result, there’s tons of historical research and presentations for those looking to learn more. Here’s a few of our favorite resources:

  • 2006 — Implementing and Detecting an ACPI BIOS Rootkit
  • 2009 — Persistent BIOS Infections
  • 2012 — UEFI technology: say hello to the Windows 8 bootkit!
  • 2015 — Summary of Attacks Against BIOS and Secure Boot
  • 2017 — Have You Scanned Your BIOS Recently?
  • 2017 — The UEFI Firmware Rootkits: Myths and Reality
  • 2018 — Advancing the State of UEFI Bootkits

Fact: Malware will continue to adapt and resist our defenses, we see this everyday.

Also fact: As hackers keep hacking, Huntress will keep hunting.

Thank you to Kyle Hanslovan and John Ferrell for contributing to this article.

Want to keep the conversation going about new attacker tradecraft techniques? Join us monthly for Tradecraft Tuesday.

Categories
Response to Incidents
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

See Huntress in action.

Our platform combines a suite of powerful managed detection and response tools for endpoints and Microsoft 365 identities, science-backed security awareness training, and the expertise of our 24/7 Security Operations Center (SOC).

Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Top Hacker Tradecraft That Caught Our Eye in 2020

    We take a look back at some of the more interesting — and innovative — hacker tradecraft we saw over the course of 2020.
  • Rapid Response: Mass Exploitation of On-Prem Exchange Servers

    On-prem Microsoft Exchange Server vulnerabilities are being actively exploited in the wild. Read our blog for Huntress' most up-to-date research and IOCs.
  • The Age of Rapid-Response Managed Detection and Response

    We teamed up with our partners at Magna5 to talk about providing real-time prevention, detection and response.
  • Tried and True Hacker Technique: DOS Obfuscation

    In this blog, we dissect a sample of malware that makes clever use of batch scripting obfuscation—turns out it was a launcher for TrickBot!
  • Obscura, an Obscure New Ransomware Variant

    Huntress found a previously unseen ransomware variant called Obscura on a victim company’s domain controller.
  • Rapid Response: Samsung MagicINFO 9 Server Flaw

    Huntress has verified Samsung’s MagicINFO 9 Server (version 21.1050.0) is vulnerable to a publicly available proof-of-concept (PoC). Understand why MagicINFO 9 Server shouldn’t be internet-facing until a patch is applied.
  • Assisted Remediation in Action

    Learn how Huntress helped an MSP partner contain and remediate an Emotet/TrickBot infection with Assisted Remediation.
  • Understanding Potentially Unwanted Programs Part I — It’s Not Always Malware

    Regardless of your daily duties, we’ve all encountered annoying ads, unwanted pop-ups, or generically named rogue applications. These nuisances, commonly called Potentially Unwanted Programs (PUP), are often unknowingly installed when downloading free software.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy