You searched for TA505 | SC Media

Your search for TA505 returned 14 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Your search for TA505 returned 14 results

Sort Results:

Relevant Recent
Cybercrime, Malware, Phishing, Security News

TA505 phishing campaign uses HTML redirectors to spread info stealer

The cybercriminal group TA505 has reportedly changed up its tactics again, now engaging in phishing campaigns that leverage attachments with HTML redirectors in order to deliver Excel documents containing malware. Following a short period of inactivity, the group, resumed activities last month with a scheme designed to get victims to install the information-stealing Trojan GraceWire,…
njRat
Cybercrime, Malware, Phishing, Security News

TA505 debuts Get2 downloader and SDBbot RAT in new phishing campaigns

The cybercriminal group TA505 has developed a new downloader tool and remote access trojan (RAT), both of which were observed in a sequence of phishing campaigns that began this past September. The downloader, named Get2, has been used in campaigns to deliver a variety of secondary payloads, including the FlawedGrace and FlawedAmmyy RATs and Snatch…
Cybercrime, Finance, Malware, Security News

TA505 cybergang debuts ‘AndroMut” downloader to deliver FlawedAmmyy RAT globally

The cybercriminal group TA505 appears to have launched two malware campaigns last June, delivering the FlawedAmmyy RAT to victims in multiple countries using the newly created downloader program AndroMut. Both campaigns infected victims using phishing emails with links for downloading Microsoft Word and Excel files, according to a July 2 blog post by Proofpoint If…
Security News

Change of stRATegy? Cybercrime group TA505 tests new tRAT malware

A newly discovered remote access trojan nicknamed tRAT has apparently attracted the interest of TA505, a cybercriminal group known for launching prolific banking malware and ransomware attacks. In a company blog post yesterday, researchers at Proofpoint reported observing  several phishing campaigns in September and October that attempted to infect victims with the malware. One of…
Government/Defense, Security News

Report details how North Korean and Russian cybercriminals are cooperating

Several companies, media outlets and the U.S. government have accused North Korean state-sponsored hackers of purchasing access to pre-hacked servers from criminal groups. But the connections to specific criminal groups have been a little more tenuous. Now a new meta-analysis of previous reports from Intel 471 establish a likely connection to TrickBot. TrickBot, as well…
Coronavirus, Security News

Threat actors play on people’s desire to help cure Coronavirus

Much like the new cases of COVID-19 that occur daily, cybercriminals are constantly rolling out new tactics, techniques and procedures based on the pandemic. One of the newer attacks, first observed on March 7, uses a Coronavirus themed email to spread RedLine Stealer malware. This is described as a particularly well designed, written and developed…
Ransomware, Security News

A tale of two ransomware attacks

Two schools, two ransomware attack and two different outcomes. The Allegheny Intermediate Unit school system was able to fend off a recent ransomware attack using back up files, meanwhile the University of Maastricht just disclosed it paid 30 bitcoins to regain control of its encrypted computer network. Allegheny Intermediate Unit (AIU), a regional public education…
APTs/cyberespionage, Cybercrime, Events, Malware, Network Security, Ransomware, Research, SC Security Ops Center, Security News, Vulnerabilities

We interviewed cyber experts on a Vegas ferris wheel. Then ride security showed up…

In the film “Ocean’s 11,” Danny Ocean and his team of expert cybercriminals execute a daring casino heist in glitzy Las Vegas. This past summer at the Black Hat and DEF CON conferences in Sin City, the editorial staff at SC Media attempted to pull off a less ambitious – and decidedly more legal –…
Next post in Network Security