Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Threat Actors

TA558 Group – Threat Actor

April 19, 2024
Reading Time: 5 mins read
in Threat Actors
TA558  Group – Threat Actor

TA558

Location

Unknown

Date of initial activity

2018

Suspected attribution

Unknown

Associated Groups

Unknown

Motivation

Financially-motivated cybercrime actor

Associated tools

Since 2018, TA558 has used at least 15 different malware families, sometimes with overlapping command and control (C2) domains. The most frequently observed payloads include Loda, Vjw0rm, AsyncRAT, and Revenge RAT.

Active

Yes

Overview

Beginning in 2018, security experts have monitored the activities of a financially-driven cybercriminal entity known as TA558, which specifically targets businesses in the hospitality, travel, and associated sectors across Latin America, sporadically extending its reach to North America and Western Europe. Utilizing a multilingual approach, the actor employs malicious emails crafted in Portuguese, Spanish, and occasionally English, often employing reservation-themed lures centered around hotel room bookings or other business-related topics. These emails serve as vectors for the distribution of various malware payloads, with at least 15 distinct types identified thus far.

Common targets

Hospitality, hotel, and travel organizations in Latin America and sometimes North America, and western Europe

Attack Vectors

Malicious emails written in Portuguese, Spanish, and sometimes English. The emails use reservation-themed lures with business-relevant themes such as hotel room bookings. The emails may contain malicious attachments or URLs aiming to distribute one of at least 15 different malware payloads, typically remote access trojans (RATs), that can enable reconnaissance, data theft, and distribution of follow-on payloads,” they added.

How they operate

Proofpoint initially detected TA558 in April 2018, marking the emergence of its clandestine operations. Utilizing malicious Word attachments exploiting Equation Editor vulnerabilities or remote template URLs, the group introduced malware such as Loda and Revenge RAT. These campaigns, conducted primarily in Spanish and Portuguese, targeted hospitality sectors, often themed around reservations. Throughout 2019, TA558 persisted in leveraging Equation Editor exploits, incorporating macro-laden PowerPoint and Office documents. Its malware repertoire expanded to include Loda, vjw0rm, and Revenge RAT, while targeting expanded to encompass business services and manufacturing. Notably, the group began incorporating English-language lures related to room bookings alongside Portuguese and Spanish. In 2020, TA558 shifted away from Equation Editor exploits, adopting malicious Office documents with macros. Despite a slight uptick in English-language lures, Portuguese and Spanish remained prevalent in reservation-themed requests. The group diversified its malware arsenal with njRAT and Ozone RAT, maintaining a focus on hotel and travel organizations. In 2021, TA558 refined its tactics, employing Office exploits and elaborate attack chains. These efforts included masquerading as Brazilian medical cooperatives to distribute AsyncRAT. The following year witnessed a significant increase in campaign tempo, with a shift to container files and increased use of URLs to deliver payloads. Notably, TA558 temporarily pivoted away from reservation themes, utilizing QuickBooks invoice email lures to distribute RevengeRAT. Recent developments include the adoption of steganography, dubbed SteganoAmor, to conceal malware delivery, including Agent Tesla, FormBook, and Remcos RAT. Phishing attacks targeting enterprises across multiple countries, facilitated by compromised SMTP servers and infected FTP servers, demonstrate TA558’s evolving sophistication and persistence in cyber operations.

Significant Attacks

  • The booking account of a hotel in Lisbon was hacked. (July 2022)
  • TA558 has been observed leveraging steganography as an obfuscation technique to deliver a wide range of malware. (April 2024)
References:
  • Through the Booking account of a hotel in Lisbon, the hacker only needed four days to profit 500 thousand euros
  • TA558 Hackers Weaponize Images for Wide-Scale Malware Attacks
  • Reservations Requested: TA558 Targets Hospitality and Travel
  • TA558 APT Group Uses Malicious Microsoft Compiled HTML Help Files
  • SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
Tags: EnglishHospitalityLatin AmericaNorth AmericaPortugueseProofpointSpanishTA558Threat ActorsWestern Europe
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

Fileless Remcos RAT Delivery Via LNK Files

FBI Warns of AI Voice Phishing Scams

APT28 RoundPress Webmail Hack Steals Emails

Google Patches Chrome Account Takeover Bug

Horabot Malware Targets LatAm Via Phishing

HTTPBot DDoS Threat To Windows Systems

Subscribe to our newsletter

    Latest Incidents

    Hackers Target Swiss Reserve Power Plant

    Coinbase Insider Attack Exposed User Data

    Cyberattack Hits J Batista Group

    Dior Breach Exposes Asian Customer Data

    Australian Human Rights Body Files Leaked

    Nucor Cyberattack Halts Plants Networks

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial