Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1171

TrickBot

What is TrickBot?

TrickBotA modular banking trojan and post-exploitation framework operated by the WIZARD SPIDER crew that paved the way for Ryuk, Conti and Diavol ransomware.


TrickBot emerged in 2016 as a successor to Dyre and rapidly evolved from a banking trojan into a versatile post-exploitation framework. Operated by the criminal cluster WIZARD SPIDER, it delivered modules for credential theft, browser injection, Active Directory reconnaissance, lateral movement via SMB and SOCKS proxies. TrickBot was a primary loader for Ryuk, Conti and later Diavol ransomware, and was strongly associated with Emotet infections during 2018-2020. Microsoft's Defender team and US Cyber Command disrupted its infrastructure in October 2020, and Conti's leaks in 2022 revealed deep ties between TrickBot developers and the Conti ransomware operation. The codebase later branched into Bumblebee.

Examples

  1. 01

    TrickBot harvests domain admin credentials from an infected accountant's laptop and ships them to operators who deploy Conti.

  2. 02

    An incident response team finds TrickBot's pwgrab64 module in memory next to Ryuk components on a domain controller.

Frequently asked questions

What is TrickBot?

A modular banking trojan and post-exploitation framework operated by the WIZARD SPIDER crew that paved the way for Ryuk, Conti and Diavol ransomware. It belongs to the Malware category of cybersecurity.

What does TrickBot mean?

A modular banking trojan and post-exploitation framework operated by the WIZARD SPIDER crew that paved the way for Ryuk, Conti and Diavol ransomware.

How does TrickBot work?

TrickBot emerged in 2016 as a successor to Dyre and rapidly evolved from a banking trojan into a versatile post-exploitation framework. Operated by the criminal cluster WIZARD SPIDER, it delivered modules for credential theft, browser injection, Active Directory reconnaissance, lateral movement via SMB and SOCKS proxies. TrickBot was a primary loader for Ryuk, Conti and later Diavol ransomware, and was strongly associated with Emotet infections during 2018-2020. Microsoft's Defender team and US Cyber Command disrupted its infrastructure in October 2020, and Conti's leaks in 2022 revealed deep ties between TrickBot developers and the Conti ransomware operation. The codebase later branched into Bumblebee.

How do you defend against TrickBot?

Defences for TrickBot typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for TrickBot?

Common alternative names include: WIZARD SPIDER, TrickLoader.

Related terms