TA505 Targets HR Departments with Poisoned CVs

  /     /     /  
Publicated : 23/11/2024   Category : security


TA505 Targets HR Departments with Poisoned CVs


Infamous cybercrime organization spotted in attacks that employ legitimate software -- and Google Drive.



A newly discovered attack campaign by the notoriously prolific TA505 cybercrime organization now is targeting businesses in Germany via their human resources executives.
Researchers at Prevailion, a security monitoring firm, today detailed the cybercrime groups latest campaign, a business email compromise–style phishing email with Trojanized curriculum vitae files. Once the rigged file is open, the attackers deploy commercial tools to mask their movements, including the NetSupport Manager remote control administration software for intel-gathering and data theft, Google Drive for hosting their hacking tools, and the GPG encryption tool as a ransomware weapon. According to Prevailion, the attack campaign has been operating since at least April 2018.
The attackers use malicious PowerShell scripts that steal login credentials from browsers and Outlook and grab payment card data. In one wave of attacks, the TA505 used GPG to encrypt the victims files and hold them for ransom. In a second wave of attacks, the group raised the bar a bit, using NetSupport to steal files, screen captures, and voice recordings — hiding the remote access Trojan in plain sight on a Google Drive account operated by the attacker.
TA505 also has been known for its use of Necurs, a sort of botnet of botnets, of which four were responsible for 95% of all malware infections, according to BitSight, which assisted Microsoft in its March 5, 2020, operation to derail the botnet by sinkholing Necurs US-based domains. While that disruption operation was significant, Necurs had been relatively quiet starting around March 2019, but still leaving some 2 million infected machines ready and able to be called for duty once again.
But TA505s recent attack campaign does not rely on any Necurs infrastructure components. Based on what weve seen on Necurs ... there is no overlapping C2 [command and control]. So you could completely take down Necurs, and this would be entirely independent of it, says Danny Adamitis, director of intelligence analysis for Prevailion.
Adamitis says this set of attacks likely occurred in February or March, and the Google Drive links were still active as of last week. It was super-targeted and directed this email to the HR director at this particular organization, he says. They were looking for Chrome, Firefox, Edge, and Outlook credentials and credit card information stored in the Chrome browser in one attack, he says. That also serves as an attack vector where they could use or sell [that data].
Prevailion did not reveal the victim organizations targeted, but the researchers initially flagged the campaign after an online forum post by someone at an organization reporting a ransomware attack that appeared to be tied to TA505.
Like any security firms research team, Prevailions has a specific view into the attack via its own tools vantage point. Prevailions platform tracks network-based traffic, and also provides a view into binaries and C2, notes Adamitis. We dont have an endpoint tool or capability, so we dont have the same level of insight to see how [a] file is downloaded, for example, he explains. But he and his team can see things like a hardcoded IP address hosting the CVs .rar file, with a script stealing credentials and hosting that executable, he says.
This isnt TA505s first rodeo abusing legitimate tools: In 2018, it
targeted US-based retailers and organizations in the food and beverage industry
using a spearphishing email in an infected Word document. When the victim opened it, the file urged them to download a copy of Remote Manipulator System (RMS) from Russian software vendor TektonIT.
G Drive
The attackers also have been hosting their tools on a Google Drive account to grab NetSupport to steal files, take screenshots, and remotely turn on the infected machines microphone to listen in.
The clue that connected the attacks to TA505: a digital signature associated with the loader used by the attackers in the German campaign. They were able to correlate one of the samples with that in a previous report by South Koreas CERT, as well as
previous research by Palo Alto Networks
on the NetSupport tool.
Weve seen them take a more sophisticated approach [now], with a brand-new loader not seen anywhere else and hosting their tools on Google Drive, Adamitis says. If a network defender sees ... Google Drive [activity], its more likely to get by them and not be flagged as suspicious, he says.
Researchers at FireEye
and
Zscaler
also have previously reported cases of the malicious use of NetSupport Manager.
The attackers were still active last week, Adamitis says, and still serving up the NetSupport tool.
Like most advanced cybercrime gangs, TA505s M.O. has similarities to those of nation-state groups. Theyre not categorized as an APT [advanced persistent threat] but ... there seems to be unique cross-pollination in some of the TTPs [tactics, techniques, and procedures], says Karim Hijazi, founder and CEO of Prevailion.
The best bet for thwarting this latest campaign or similar attacks is deploying an email security solution, keeping anti-malware updated, requiring strong passwords, and segmenting the network so the attackers cant easily move laterally,
the researchers recommend

Related Content:
TA505 Group Launches New Targeted Attacks
TA505 Abusing Legit Remote Admin Tool in String of Attacks
New Threat Group Using Old Technique to Run Custom Malware
How Enterprises Are Developing and Maintaining Secure Applications
Check out The Edge, Dark Readings new section for features, threat data, and in-depth perspectives. Todays top story:
Security Lessons Weve Learned (So Far) from COVID-19
.
 

Last News

▸ ArcSight prepares for future at user conference post HP acquisition. ◂
Discovered: 07/01/2025
Category: security

▸ Samsung Epic 4G: First To Use Media Hub ◂
Discovered: 07/01/2025
Category: security

▸ Many third-party software fails security tests ◂
Discovered: 07/01/2025
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
TA505 Targets HR Departments with Poisoned CVs