TA866 Cybercrime Group Returns with Sophisticated Phishing Attacks

, TA866 phishing attack

The cybersecurity landscape faces unyielding threats as malevolent actors like TA866 unleash sophisticated attacks on North America. After a nine-month hiatus, TA866 has resumed activities, launching an extensive phishing campaign cloaked in seemingly ordinary invoice-themed emails. Recipients, enticed by decoy PDF attachments hosting OneDrive URLs, unwittingly trigger a multi-step infection chain. This pernicious scheme unfurls into the installation of the WasabiSeed and Screenshotter malware, as identified by the vigilant enterprise security experts at Proofpoint.

The operational style of TA866, characterized by a preference for WasabiSeed—a Visual Basic script dropper—and Screenshotter—spyware designed to clandestinely capture desktop screenshots—evinces a chilling proficiency. Screenshotter morphs into a reconnaissance agent, paving the way for Rhadamanthys, a notorious information stealer. Schematic evolution retains the essence of TA866’s historical modus operandi, transitioning from macro-enabled sources to rogue PDFs containing malicious OneDrive links.

The cybersecurity firm ESET unraveled connections between TA866’s cyberschemes and another group, Asylum Ambuscade, infamous for cyber espionage activities. TA571, a spam distributor employed by TA866, disseminates these treacherous PDFs, which harbor a plethora of malware tools, such as AsyncRAT and QakBot. Within this nefarious arsenal lies DarkGate, a multi-faceted malware enabling information theft, cryptocurrency mining, and the execution of arbitrary programs. The Splunk Threat Research Team provides painstaking analysis of DarkGate, a malware that is selective in its distribution, continuously refined to thwart detection and is reshaping the cybersecurity battlefront.

Adding to the already precarious situation, Cofense reveals the manipulation of security product caching mechanisms. Attackers ingeniously transform benign cached results into sinister payloads, bypassing initial security checks. This innovation in evasion, which predominantly afflicts sectors like financial services and manufacturing, underscores a growing trend. Trellix Email Security, for instance, counters this by reassessing URLs at the moment of user interaction.

To guard against such disconcerting threats, it is paramount for organizations to foster vigilance and exercise prudence in handling potentially hazardous emails. Implementing up-to-date antivirus defenses, spam filters, and comprehensive employee education are non-negotiable necessities. Stay informed and take preemptive actions, and remember, awareness is the cornerstone of cybersecurity.

The collaborative efforts of the cybersecurity community, including contributions from Palo Alto Networks and mediums such as S2W Blog, are invaluable. These share findings, methodologies, and Indicators of Compromise (IoCs) to bolster defenses across the landscape. The message is lucid: Complacency has no place in the realm of cyber protection. Constant vigilance, proactive defense, and strategic partnerships are the triad to fortify our digital frontiers against ever-evolving cyber threats.

If you enjoyed this article, please check out our other articles on CyberNow

January 20, 2024
After a nine-month hiatus, TA866 resumes operations with a refined phishing scheme, employing malware like WasabiSeed and Screenshotter.