{"id":37769,"date":"2020-10-20T12:15:00","date_gmt":"2020-10-20T12:15:00","guid":{"rendered":"https:\/\/www.darkreading.com\/threat-intelligence\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/d\/d-id\/1339217"},"modified":"2020-10-20T12:15:00","modified_gmt":"2020-10-20T12:15:00","slug":"trickbot-tenacity-shows-infrastructure-resistant-to-takedowns","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/","title":{"rendered":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<header><\/header>\n<p><span class=\"strong black\">Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot &#8212; but with only a short-term impact.<\/span><\/p>\n<p class>On Oct. 12, armed with a court order, Microsoft and the Financial Services Information Sharing and Analysis Center (FS-ISAC) disconnected command-and-control (C2) servers at 19 different Internet addresses in an attempt to disrupt the Trickbot botnet, which has infected more than 1 million systems since 2016. They were not the only ones attacking the botnet, either. The takedown followed three weeks of disruptive operations against the Trickbot infrastructure&nbsp;<a href=\"https:\/\/www.washingtonpost.com\/national-security\/cyber-command-trickbot-disrupt\/2020\/10\/09\/19587aae-0a32-11eb-a166-dc429b380d10_story.html\" target=\"_blank\" rel=\"noopener noreferrer\">reportedly carried out by US Cyber Command<\/a>.<\/p>\n<p>Yet the takedowns and disruptive operations had only&nbsp;a moderate impact on Trickbot. In early September, the botnet sent 4,000 to 5,000 messages per campaign using at least 37 C2 servers, according to security firm Proofpoint. In late September and early October, the number of C2 servers slowly decreased to a dozen, and since Oct. 12 the botnet has sent about 1,000 messages to a little more than 100 organizations, says Sherrod DeGrippo, senior director of threat research at Proofpoint.<\/p>\n<p>&#8220;We don&#8217;t know that the actors have necessarily made any additional hardening efforts against disruptions or takedowns, but given that the botnet was merely disrupted and not actually taken down, their current mitigations were at least somewhat effective,&#8221; DeGrippo said.&nbsp;<\/p>\n<p>The failure to taken down Trickbot for a significant duration demonstrates that cybercriminals have adopted significant countermeasures against defenders&#8217; tactics. By Oct. 15, for example, another operation had started a phishing campaign that aimed to install the modular banking Trojan <a href=\"https:\/\/www.darkreading.com\/edge\/theedge\/emotet-101-how-the-ransomware-works----and-why-its-so-darn-effective\/b\/d-id\/1339124\" target=\"_blank\" rel=\"noopener noreferrer\">Emotet<\/a> on systems and then download and install Trickbot, according to threat intelligence firm Intel471.<\/p>\n<p>&#8220;The fact that Trickbot has resumed normal operations despite the best efforts of US Cyber Command and Microsoft shows how resilient of an operation Trickbot is and how much more effort is needed to fully take the botnet offline for good,&#8221; the company <a href=\"https:\/\/public.intel471.com\/blog\/trickbot-online-emotet-microsoft-cyber-command-disruption-attempts\/\" target=\"_blank\" rel=\"noopener noreferrer\">stated in a blog post<\/a>. &#8220;The botnet&#8217;s operators have all the IT support of legitimate enterprises \u2014 continuity planning, backups, automated deployment, and a dedicated workforce \u2014 that allow them to quickly react to disruptive measures.&#8221;<\/p>\n<p>The efforts against Trickbot required a great deal of research effort and collaboration. While few details are known about the US Cyber Command&#8217;s attempts to disrupt the network, Microsoft <a href=\"https:\/\/www.darkreading.com\/vulnerabilities---threats\/advanced-threats\/security-firms-and-financial-group-team-up-to-take-down-trickbot\/d\/d-id\/1339155\" target=\"_blank\" rel=\"noopener noreferrer\">analyzed 61,000 sample of the Trickbot malware<\/a> to gain insight into the infrastructure. As part of that effort, security firm ESET analyzed 125,000 samples of Trickbot code and 40,000 configuration files.<\/p>\n<p>As a result, the US District Court for the Eastern District of Virginia granted the companies a temporary restraining order to take down the servers associated with 19 Internet addresses.<\/p>\n<p>&#8220;Trying to disrupt an elusive threat such as Trickbot is very challenging and complex,&#8221; ESET stated at the conclusion of <a href=\"https:\/\/www.welivesecurity.com\/2020\/10\/12\/eset-takes-part-global-operation-disrupt-trickbot\/\" target=\"_blank\" rel=\"noopener noreferrer\">its analysis<\/a>. &#8220;It has various fallback mechanisms and its interconnection with other highly active cybercriminal actors in the underground makes the overall operation extremely complex.&#8221;<\/p>\n<p>The concerns proved out. While Trickbot&#8217;s C2 network showed signs of disruption, CrowdStrike, Intel471, and Proofpoint each determined that the group behind the Trickbot network \u2014&nbsp;<a href=\"https:\/\/www.crowdstrike.com\/blog\/wizard-spider-adversary-update\/\" target=\"_blank\" rel=\"noopener noreferrer\">dubbed &#8220;Wizard Spider&#8221; by security services firm CrowdStrike<\/a>&nbsp;\u2014 has continued operations and increasingly using other tools to facilitate its search for vulnerable companies to infect with ransomware.<\/p>\n<p>&#8220;While the valiant efforts of the cybersecurity teams involved in this complex operation undoubtedly had a short-term impact on Wizard Spider\u2019s Trickbot network, the response by the criminal actors has been swift, effective, and efficient,&#8221; CrowdStrike researchers stated in an analysis of current Trickbot operations. &#8220;[W]ith its diverse and effective toolset, [the group] has proven to be a highly capable adversary and continues to be resilient, reactive and resolute as they continue to run their formidable criminal enterprise.&#8221;<\/p>\n<p>The ability of Trickbot to continue despite the pressure brought by large technology companies and the US government underscores that technical takedowns are neither a sufficient nor an efficient solution, says Mark Arena, CEO of threat intelligence service Intel471.<\/p>\n<p>&#8220;No amount of geographically limited takedowns will shut down Trickbot without coordination, cooperation, and action with numerous stakeholders, including international law enforcement, governments, and the global security community,&#8221; he says.<\/p>\n<p>In the end, pressure needs to be brought against the cybercriminals and threat actors who continue to support and operate the infrastructure, Arena says.<\/p>\n<p>&#8220;Strategies to shutdown Trickbot for good would need to include arrests, financial asset seizures \u2014 of cryptocurrency wallets, for example \u2014 coordinated and global infrastructure takedowns, and potentially even offensive action against Trickbot infrastructure [that] isn&#8217;t able to be taken down,&#8221; he says.<\/p>\n<p><span class=\"italic\">Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT&#8217;s Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline &#8230; <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=1161\">View Full Bio<\/a><\/span><\/p>\n<p><strong>Recommended Reading:<\/strong><\/p>\n<p><span class=\"smaller strong red allcaps\">More Insights<\/span><\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/d\/d-id\/1339217?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Both the US Cyber Command and a Microsoft-led private-industry group have attacked the infrastructure used by attackers to manage Trickbot &#8212; but with only a short-term impact. Read More <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/d\/d-id\/1339217?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-37769","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-20T12:15:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns\",\"datePublished\":\"2020-10-20T12:15:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/\"},\"wordCount\":806,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/\",\"name\":\"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"datePublished\":\"2020-10-20T12:15:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/twimgs.com\\\/nojitter\\\/darkreading\\\/dr-logo.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/","og_locale":"en_US","og_type":"article","og_title":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-10-20T12:15:00+00:00","og_image":[{"url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns","datePublished":"2020-10-20T12:15:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/"},"wordCount":806,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/","url":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/","name":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#primaryimage"},"thumbnailUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","datePublished":"2020-10-20T12:15:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#primaryimage","url":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg","contentUrl":"https:\/\/twimgs.com\/nojitter\/darkreading\/dr-logo.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/trickbot-tenacity-shows-infrastructure-resistant-to-takedowns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trickbot Tenacity Shows Infrastructure Resistant to Takedowns"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=37769"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/37769\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=37769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=37769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=37769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}