Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Python Malware Targets Tatar-Language Users

September 27, 2023
Reading Time: 2 mins read
in Alerts

A new cybersecurity threat has emerged with the discovery of Python malware specifically targeting users who speak the Tatar language. This language is primarily spoken by the Tatars, an ethnic group in Russia and neighboring regions.

Furthermore, the malware, identified by cybersecurity firm Cyble, has the capability to capture screenshots on infected systems and transmit them to a remote server using FTP. Behind this campaign is the notorious TA866 threat actor, known for targeting Tatar language speakers and utilizing Python malware for their operations.

Additionally, the TA866 threat actor orchestrated this Python malware campaign to coincide with the Tartar Republic Day celebrations, which continued until the end of August. The actor employs a PowerShell script designed to capture and upload screenshots to a remote FTP server.

The attack begins with phishing emails embedded with a malicious RAR file containing deceptive video and Python-based executable files. Upon execution, the loader initiates a series of events, fetching additional executable files and PowerShell scripts from Dropbox to create a scheduled task for executing the malicious executable.

Proofpoint, in its investigation, traced the origins of the TA866 threat actor to a financially motivated activity known as “Screentime.” This threat actor, which is well-organized and capable of large-scale attacks, has previously targeted organizations in the United States and Germany. The TA866 threat actor is known for creating custom hacking tools and services to carry out sophisticated attacks.

In this particular campaign, they use the RAR file to infect victims’ computers with Python malware, cleverly exploiting Tatar language filenames to evade detection. This malicious executable captures and transmits screenshots to an FTP server, and in subsequent phases, deploys additional post-exploitation tools like Cobalt Strike beacons and RATs, highlighting their expertise in developing advanced malware.

Reference:
  • Python Malware Targets Tatar-Language Users: TA866 Threat Actor Strikes Again
Tags: Cyber AlertCyber Alerts 2023CybersecurityCybleMalwarePhishingPythonRussiaSeptember 2023Vulnerabilities
ADVERTISEMENT

Related Posts

Intellexa Leak Exposes Predator Zero Days

Silver Fox Spreads ValleyRAT In China

December 5, 2025
Intellexa Leak Exposes Predator Zero Days

Intellexa Leak Exposes Predator Zero Days

December 5, 2025
Hackers Exploit ArrayOS AG VPN Flaw

Hackers Exploit ArrayOS AG VPN Flaw

December 5, 2025
WordPress Elementor Addon Flaw Exploited

Record DDoS Linked To Massive Botnet

December 4, 2025
WordPress Elementor Addon Flaw Exploited

RSC Bugs Let Hackers Run Remote Code Now

December 4, 2025
WordPress Elementor Addon Flaw Exploited

WordPress Elementor Addon Flaw Exploited

December 4, 2025

Latest Alerts

Silver Fox Spreads ValleyRAT In China

Intellexa Leak Exposes Predator Zero Days

Hackers Exploit ArrayOS AG VPN Flaw

Record DDoS Linked To Massive Botnet

RSC Bugs Let Hackers Run Remote Code Now

WordPress Elementor Addon Flaw Exploited

Subscribe to our newsletter

    Latest Incidents

    ASUS Confirms Vendor Breach By Everest

    Marquis Breach Hits Over 780,000 People

    Leroy Merlin Reports Data Breach

    Freedom Mobile Customer Data Breach Exposed

    Penn Phoenix Data Breach Oracle Hack Now

    Defender Outage Disrupts Threat Alerting

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial