Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

TA866 Revival with an Email Threat Campaign

January 19, 2024
Reading Time: 2 mins read
in Alerts
TA866 Revival with an Email Threat Campaign

Proofpoint researchers have recently detected the reappearance of threat actor TA866 in a significant email threat campaign, marking the end of a nine-month absence. On January 11, 2024, Proofpoint successfully thwarted a large-scale campaign aimed at North America, involving several thousand emails. The attackers utilized invoice-themed emails, each housing PDF attachments named “Document_[10 digits].pdf,” with subjects such as “Project achievements.”

The PDFs contained OneDrive URLs, initiating a complex infection chain upon clicking, ultimately leading to the deployment of a malware payload, specifically a variant of the WasabiSeed and Screenshotter custom toolset. The attack chain mirrored similarities with TA866’s last documented campaign on March 20, 2023, utilizing the TA571 spam service and maintaining consistency in the WasabiSeed downloader and Screenshotter scripts. However, a notable change was the introduction of a PDF attachment containing a OneDrive link, deviating from previous campaigns that utilized macro-enabled Publisher attachments or 404 TDS URLs directly in the email body.

Attribution of the threat actors reveals that TA571, a spam distributor, handled the delivery service for the malicious PDF, while TA866, known for engaging in both crimeware and cyberespionage activities, managed the post-exploitation tools. The campaign’s financial motivation raises concerns, emphasizing TA866’s organized capabilities in executing well-thought-out attacks at scale, with access to custom tools and connections to purchase additional services from other threat actors.

Reference:
  • TA866 Returns with a Large Email ThreatcCampaign

Tags: Cyber AlertCyber Alerts 2024Cyber RiskCyber threatJanuary 2024North AmericaProofpointTA866
ADVERTISEMENT

Related Posts

Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

July 23, 2025
Lumma Stealer Returns with New Tactics

Lumma Stealer Returns with New Tactics

July 23, 2025
Lumma Stealer Returns with New Tactics

MuddyWater Emerges Amid Iran-Israel Clash

July 23, 2025
3.5K Sites Hijacked to Secretly Mine Crypto

CrushFTP Warns of Exploit in the Wild

July 22, 2025
3.5K Sites Hijacked to Secretly Mine Crypto

3.5K Sites Hijacked to Secretly Mine Crypto

July 22, 2025
3.5K Sites Hijacked to Secretly Mine Crypto

7-Zip Flaw Lets Malicious Files Crash PCs

July 22, 2025

Latest Alerts

Lumma Stealer Returns with New Tactics

npm Phishing Emails Target Developer Logins

MuddyWater Emerges Amid Iran-Israel Clash

CrushFTP Warns of Exploit in the Wild

7-Zip Flaw Lets Malicious Files Crash PCs

3.5K Sites Hijacked to Secretly Mine Crypto

Subscribe to our newsletter

    Latest Incidents

    Weak Password Triggers Ransomware Old Firm

    US Nuclear Agency Breached in MS Hack

    European Healthcare Network Breached

    CoinDCX Says $44M Stolen from Reserves

    Poland Probes Air Traffic Control Issue

    Dior Alerts Customers After Cyberattack Hit

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial