Exploring CPUs, motherboards, overclocking, building your own PC, case mods, PC brands, handhelds, peripherals of all types, DVDs, CD burners, hardware-specific software, device drivers, and anything else related to hardware.
The The Restaurant at the Edge of the Universe, previously known as The Water Cooler, is a place to post stuff that has absolutely nothing at all to do with computers, broadband, Scot's Newsletter, or anything that's "supposed" to be here.
So all that has to happen is a spam email with its malicious attachment must make it past all security and the spam filters coming into the network.
The user, seeing this unsolicited email must open it, then click on the unsolicited Word document attachment that then releases malware that sneaks past without being detected all anti-malware solutions running on the computer to compromise that user's computer.
That malicious code then must make its way through the company network to the domain controller, sneaking past that server's own security.
Then the malicious TrickBot code, running on that server while remaining undetected, must somehow gain administrative access, grab the Active Directory credentials from the AD database, and then it can execute its payload to grab user credentials.
I'm not trying to minimize the threat, but TrickBot has been around since 2016. And certainly I am not trying to take anything away from Larry Abrams or his article. But the facts are, any network security administrator should already be on top of this.
That's a pretty big IF!
Really, what this article serves is another, but very important reminder and training opportunity to all administrators and users, to avoid being "click-happy" on unsolicited emails, attachments, popups, downloads and links. And for all computer admins (business and home/personal) to keep our operating systems and security software current. And above all, avoid being "click-happy".