Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Python Malware Targets Tatar-Language Users

September 27, 2023
Reading Time: 2 mins read
in Alerts

A new cybersecurity threat has emerged with the discovery of Python malware specifically targeting users who speak the Tatar language. This language is primarily spoken by the Tatars, an ethnic group in Russia and neighboring regions.

Furthermore, the malware, identified by cybersecurity firm Cyble, has the capability to capture screenshots on infected systems and transmit them to a remote server using FTP. Behind this campaign is the notorious TA866 threat actor, known for targeting Tatar language speakers and utilizing Python malware for their operations.

Additionally, the TA866 threat actor orchestrated this Python malware campaign to coincide with the Tartar Republic Day celebrations, which continued until the end of August. The actor employs a PowerShell script designed to capture and upload screenshots to a remote FTP server.

The attack begins with phishing emails embedded with a malicious RAR file containing deceptive video and Python-based executable files. Upon execution, the loader initiates a series of events, fetching additional executable files and PowerShell scripts from Dropbox to create a scheduled task for executing the malicious executable.

Proofpoint, in its investigation, traced the origins of the TA866 threat actor to a financially motivated activity known as “Screentime.” This threat actor, which is well-organized and capable of large-scale attacks, has previously targeted organizations in the United States and Germany. The TA866 threat actor is known for creating custom hacking tools and services to carry out sophisticated attacks.

In this particular campaign, they use the RAR file to infect victims’ computers with Python malware, cleverly exploiting Tatar language filenames to evade detection. This malicious executable captures and transmits screenshots to an FTP server, and in subsequent phases, deploys additional post-exploitation tools like Cobalt Strike beacons and RATs, highlighting their expertise in developing advanced malware.

Reference:
  • Python Malware Targets Tatar-Language Users: TA866 Threat Actor Strikes Again
Tags: Cyber AlertCyber Alerts 2023CybersecurityCybleMalwarePhishingPythonRussiaSeptember 2023Vulnerabilities
ADVERTISEMENT

Related Posts

Crocodilus Trojan Steals Crypto Globally

Crocodilus Trojan Steals Crypto Globally

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Bogus CAPTCHA Lures Install NetSupport RAT

June 4, 2025
Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

June 4, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Fake FB Ban Fix Extension Steals Accounts

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

Actively Exploited Chrome V8 Flaw Patched

June 3, 2025
DevOps Servers Hit By JINX0132 Crypto Mine

DevOps Servers Hit By JINX0132 Crypto Mine

June 3, 2025

Latest Alerts

Bogus CAPTCHA Lures Install NetSupport RAT

Crocodilus Trojan Steals Crypto Globally

Fake RubyGems Steal Telegram Bot Tokens

Fake FB Ban Fix Extension Steals Accounts

Actively Exploited Chrome V8 Flaw Patched

DevOps Servers Hit By JINX0132 Crypto Mine

Subscribe to our newsletter

    Latest Incidents

    Malaysia Home Minister WhatsApp Breached

    MainStreet Bank Faces Vendor Data Breach

    BitoPro Loses $11.5M In DeFi Hack Wave

    Cartier Data Breach Exposes Client Info

    White House Chief of Staff’s Phone Hacked

    The North Face Hit By 4th Credential Hack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial