A new cybersecurity threat has emerged with the discovery of Python malware specifically targeting users who speak the Tatar language. This language is primarily spoken by the Tatars, an ethnic group in Russia and neighboring regions.
Furthermore, the malware, identified by cybersecurity firm Cyble, has the capability to capture screenshots on infected systems and transmit them to a remote server using FTP. Behind this campaign is the notorious TA866 threat actor, known for targeting Tatar language speakers and utilizing Python malware for their operations.
Additionally, the TA866 threat actor orchestrated this Python malware campaign to coincide with the Tartar Republic Day celebrations, which continued until the end of August. The actor employs a PowerShell script designed to capture and upload screenshots to a remote FTP server.
The attack begins with phishing emails embedded with a malicious RAR file containing deceptive video and Python-based executable files. Upon execution, the loader initiates a series of events, fetching additional executable files and PowerShell scripts from Dropbox to create a scheduled task for executing the malicious executable.
Proofpoint, in its investigation, traced the origins of the TA866 threat actor to a financially motivated activity known as “Screentime.” This threat actor, which is well-organized and capable of large-scale attacks, has previously targeted organizations in the United States and Germany. The TA866 threat actor is known for creating custom hacking tools and services to carry out sophisticated attacks.
In this particular campaign, they use the RAR file to infect victims’ computers with Python malware, cleverly exploiting Tatar language filenames to evade detection. This malicious executable captures and transmits screenshots to an FTP server, and in subsequent phases, deploys additional post-exploitation tools like Cobalt Strike beacons and RATs, highlighting their expertise in developing advanced malware.