U.S. Markets open in 6 hrs 42 mins

CyberInt Reports: TA505 Threat Actors Strike Again with New Malware

Financial Institutions in Chile Targeted by Suspected Russian-speaking Group

TEL AVIV, Israel, May 30, 2019 /PRNewswire/ -- Investigators from CyberInt Research have discovered further activities by the suspected Russian-speaking cybergang TA505. The group has been detected targeting financial institutions in Chile with slightly modified modus operandi following CyberInt's public exposure of its tactics, techniques and procedures (TTPs).

CyberInt's Managed Targeted Detection and Mitigation platform detects threats across the digital and organizational environments, integrating internal and external threats to reveal unknown threats and incidents. It's based on a modular automated platform that prioritizes integrated insights across organizational and digital environments, managed holistically by intelligence analysts to enable immediate and effective response.

TA505 is continuing its unauthorized and nefarious use of the same TTPs of legit software, this time leveraging MSI Installer to deploy the AMADAY malware family.

The AMADAY implant allows TA505 to steal financial institutions' and retailers' clients' email correspondence and sensitive information from their victims. This further enables the threat actors to steal contact lists, allowing them to target additional organizations by sending seemingly legitimate malicious emails that appear to come from trusted sources.

TA505, which appears to be financially motivated, has been active since 2014, with high-volume malicious email campaigns distributing the "Dridex" and "Shifu" banking trojans as well as the Neutrino botnet/exploit kit and Locky ransomware. They appeared again as the source for recent attacks against the global financial and retail industry from December 2018 to present, with attacks worldwide, including India, Italy, Malawi, Pakistan, South Korea, and the United States.

"TA505 is highly motivated, very clever, and persistent," says Adi Peretz, Head of Research at CyberInt. "It's critical to monitor their activities to anticipate further attacks. Once the pattern of attacks in Chile were identified, other financial institutions can beef up their security, so they don't end up being breached."

"Social engineering works because it recruits the weakest link in any cybersecurity operation – we humans," continues Mr. Peretz. "The more prepared companies are, the better they can train their people to maintain security."

CyberInt previously released a comprehensive report about TA505 activities and modus operandi. Download the full report here.

CyberInt will be revealing more about TA505 at Infosecurity Europe in London next week, June 4-6, Booth #B165.

About CyberInt
CyberInt uses agile business-centered insight and action to transform cybersecurity into a business enabler. CyberInt delivers the only platform combining cyber expertise and profound business understanding to deliver insights and actions that protect what matters most: the business goals, customers, employees, and brand.  CyberInt serves top retail, finance, and gaming organizations around the world and has developed a deep understanding of the threats, needs, and behaviors particular to each industry. www.cyberint.com

Media Contact

Amy Kenigsberg
K2 Global Communications

http://k2-gc.com/

amy@k2-gc.com
tel: +972-9-794-1681 (+2 GMT)
mobile: +972-524-761-341
U.S.: +1-913-440-4072 (+7 ET)

Cision

View original content:http://www.prnewswire.com/news-releases/cyberint-reports-ta505-threat-actors-strike-again-with-new-malware-300859285.html