Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

TA866 Revival with an Email Threat Campaign

January 19, 2024
Reading Time: 2 mins read
in Alerts
TA866 Revival with an Email Threat Campaign

Proofpoint researchers have recently detected the reappearance of threat actor TA866 in a significant email threat campaign, marking the end of a nine-month absence. On January 11, 2024, Proofpoint successfully thwarted a large-scale campaign aimed at North America, involving several thousand emails. The attackers utilized invoice-themed emails, each housing PDF attachments named “Document_[10 digits].pdf,” with subjects such as “Project achievements.”

The PDFs contained OneDrive URLs, initiating a complex infection chain upon clicking, ultimately leading to the deployment of a malware payload, specifically a variant of the WasabiSeed and Screenshotter custom toolset. The attack chain mirrored similarities with TA866’s last documented campaign on March 20, 2023, utilizing the TA571 spam service and maintaining consistency in the WasabiSeed downloader and Screenshotter scripts. However, a notable change was the introduction of a PDF attachment containing a OneDrive link, deviating from previous campaigns that utilized macro-enabled Publisher attachments or 404 TDS URLs directly in the email body.

Attribution of the threat actors reveals that TA571, a spam distributor, handled the delivery service for the malicious PDF, while TA866, known for engaging in both crimeware and cyberespionage activities, managed the post-exploitation tools. The campaign’s financial motivation raises concerns, emphasizing TA866’s organized capabilities in executing well-thought-out attacks at scale, with access to custom tools and connections to purchase additional services from other threat actors.

Reference:
  • TA866 Returns with a Large Email ThreatcCampaign

Tags: Cyber AlertCyber Alerts 2024Cyber RiskCyber threatJanuary 2024North AmericaProofpointTA866
ADVERTISEMENT

Related Posts

Malicious Firefox Add Ons Steal Crypto Keys

Malicious Firefox Add Ons Steal Crypto Keys

July 4, 2025
Google Removes 352 ‘IconAds’ Fraud Apps

Google Removes 352 ‘IconAds’ Fraud Apps

July 4, 2025
Browser Cache Attack Bypasses Web Security

Browser Cache Attack Bypasses Web Security

July 4, 2025
Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

July 3, 2025
Critical Sudo Flaws Expose Linux Systems

PDFs Deliver QR Codes in Callback Scams

July 3, 2025
Critical Sudo Flaws Expose Linux Systems

Critical Sudo Flaws Expose Linux Systems

July 3, 2025

Latest Alerts

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

PDFs Deliver QR Codes in Callback Scams

Critical Sudo Flaws Expose Linux Systems

Unkillable Mac Malware From North Korea

Subscribe to our newsletter

    Latest Incidents

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    Cyberattack Hits Medtech Firm Surmodics

    Rhysida Ransomware Hits German Charity WHH

    Hacker Accesses Max Financial’s User Data

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial