Trojan operator using colorful and elaborate lures to infect victims .:. Andy Rixon
Trojan operator using colorful and elaborate lures to infect victims

New threat actor uses local languages and logos to infect victims with remote access trojans

Cybercriminals use all kinds of different lures to trick potential victims into falling for their schemes but security researchers at Proofpoint have been tracking a new threat actor that uses localized lures with colorful images to impersonate local banks, law enforcement and shipping services.

The cybersecurity firm has given the new threat actor the designation TA2719 and to date, it has been observed sending low volume campaigns to recipients in Austria, Chile, Greece, Hungary, Italy, North Macedonia, Netherlands, Spain, Sweden, Taiwan, United States and Uruguay. This is quite unusual as cybercriminals typically focus on only a few countries or regions at a time when launching phishing attacks.

Most of the lures used in TA2719's campaigns appear to come from a real person with a connection to the spoofed organizations. The threat actor also uses specific details such as local street addresses combined with an organization's official branding to make their messages appear more legitimate.

TA2719 typically delivers its malware using malicious attachments but in the early campaigns, it also used URLs linking to malicious files. The threat actor also uses the popular commodity remote access trojans (RATs) NanoCore and then later the AsyncRAT.

Local lures

From March to May of this year, TA2719's campaigns were primarily law enforcement-themed. The threat actor used local languages and logos to impersonate Russian police as well as the Royal Thai Police.

In addition to law enforcement-themed lures, TA2719 also spoofed shipping notifications in some of its messages. For instance, one early campaign preyed on users' Covid-19 fears and impersonated the Taiwan Centers for Disease Control by leveraging both malicious URLs and attachments to deliver its payload.

In June, Proofpoint's researchers observed that TA2719 had moved away from law enforcement lures and began to use more common bank, shipping and purchase order lures. However, by mid-July, the threat actor had shifted to exclusively using package delivery lures to impersonate shipping companies.

The Proofpoint Threat Research Team provided further insight on TA2719's operations in a blog post, saying:

“While not the most advanced lures we’ve seen, the localization and inclusion of legitimate street addresses and names of real individuals related to the spoofed entities demonstrate this actor’s attention to detail. Though TA2719 does not appear to target any particular industry, they tailor their messages to various geographies and send medium-volume campaigns several times per month. Their use of free DDNS providers, reuse of infrastructure, and reliance on commodity malware demonstrate the ease with which threat actors can begin and maintain an operation.”

News by Andy Rixon, created 27 Aug, 2020

Share on
Find what you need
Looking for something specific?
Author Information

Andy Rixon

I am a kind individual that has high ambitions, sometimes too high if you ask me, but that doesn't stop me from trying to do the best that I can in life.

I enjoy a number of things, including but not limited to - gaming and web development.

For more information...
View Profile

© 2021 Andy Rixon
All images are copyright to their respective owners

Made with by VibeCMS
Follow on