Hacker group first spies on whether victims are lucrative

Share post

Proofpoint security experts have uncovered a new hacker group called TA866, which attacked tens of thousands of companies with malware between October 2022 and January 2023. The activities are aimed in particular at organizations in Germany and the USA.

One detail of the TA866 attacks stands out: the cybercriminals first analyze screenshots of their potential victims' IT environments to identify particularly lucrative targets. They only try to infect the victim with a bot or a stealer if they think it is worth further involvement.

🔎 The attack chain shows all scripts, tools and malware involved (Image: Proofpoint).

Attack launch with screentime

From October 2022 through January 2023, Proofpoint observed a cluster of financially motivated activity that experts refer to as "screentime." The chain of attacks starts with an email that contains a malicious attachment or URL. Both lead to malware known as "WasabiSeed" and "Screenshotter". In some cases, Proofpoint observed activities that included AHK Bot and Rhadamanthys Stealer following the primary infection.

Most campaigns in October and November 2022 consisted of a limited number of emails and focused on a small number of companies. The campaigns were observed on average once or twice a week and the messages contained attached publisher files. In November and December 2022, around the time the group transitioned to using URLs, the scale of operations increased and email volume increased dramatically. Typical campaigns comprised thousands or even tens of thousands of emails and could be observed two to four times a week. In January 2023, the frequency of campaigns decreased, but email volume grew even more.

The chain of infection

On January 23 and 24, 2023, Proofpoint observed tens of thousands of email messages targeting over a thousand companies. The messages targeted organizations in the US and Germany. The e-mails sent seemed to rely on thread hijacking and lured with subject lines such as "Check my presentation". These messages contained malicious URLs that launched a multi-stage chain of attacks. When a user clicks on the URL, they set the chain of attacks in motion. In a blog post at Proofpoint, all the individual steps are examined and documented using various screenshots.

More at proofpoint.com

 


About Proofpoint

Proofpoint, Inc. is a leading cybersecurity company. The focus for Proofpoint is the protection of employees. Because these mean the greatest capital for a company, but also the greatest risk. With an integrated suite of cloud-based cybersecurity solutions, Proofpoint helps organizations around the world stop targeted threats, protect their data, and educate enterprise IT users about the risks of cyberattacks.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more