Secret Message: Steganography Tricks of TA558 Group in Cyber Attacks on Enterprises in Russia and Belarus
July 30, 2024, 4:31 p.m.
Description
F.A.C.C.T.'s Threat Intelligence analysts have investigated numerous cyberattacks by the TA558 group targeting enterprises, government institutions, and banks in Russia and Belarus. The attacks aimed to steal data and gain access to the organization's internal systems. TA558 used multi-stage phishing campaigns, malware distribution, and advanced social engineering techniques, including steganography to conceal malicious payloads within images and encoded text files. The group leveraged legitimate compromised SMTP servers and created email accounts masquerading as legitimate organizations to distribute malicious emails with malware such as Agent Tesla and Remcos.
Tags
Date
- Created: July 30, 2024, 3:54 p.m.
- Published: July 30, 2024, 3:54 p.m.
- Modified: July 30, 2024, 4:31 p.m.
Indicators
- fda7e2d7a3ee70355988afc70ee4d6ebf08b76ef38f4504aa1cf5f8fa9a99b2e
- eecb89aaf97fa8333c2c56c16e3905b2b2764271d7f7944bc71a8aba64d2906c
- ea17ccf4bf55f23b8a93f8e17e470be440211f463d5b7e01958843c8c160f765
- e2ee9ac33c1e07a99f8cc6044f0a7b830e892fbfbfd7d6e8db916707e9c34035
- d5e214f3096564dfc3e348b6a3ac6aeefed75d785ac7cfab5d3019f67fdbc9be
- c0e49a1256f7e6b66607f2440219ce5e684bd591fc1fb7c64b90e9b9218374a9
- bc46b7b44928f6ad586d787db33f53ed962aab72441a5518efb3e971d36a40e2
- a2d5c106ced87a5771490d95bc20c385f8ae49f7e8448b2e68a3c6bf0d96d03b
- 91a14852328b337a5aa1046bc7f92448f2c0a3c2ec5a8a76729de68521fa2a39
- 8d12cfdb1376c99139b8dba94a0c02357bf7652b763d6313d70dde912266905f
- 6b19f6c758c0b626d1319314e9679d55701e156a9642409e8899a1e7d6a20026
- 89eb53096ec6248185c7797c802d1bd9b539097f01592bfe5f9e183d753d20ce
- 4d97a5069b154b2e95af235dd32c82c1bf5b2e4cf2d188067da223f488ebaa48
- 55f02d8a8f8fe958eeb020593b48d25c86238bd2a7746b9c7b7e4afa9e88c315
- 4cc7a5fe2d2ffafda3791f0e9cced8f7fe430b598551c2a9277210e87e6df53b
- 383ee0319fade807fd02f12a92d4f2b98ba7137f27212b996f3cc9bd88f278ac
- 32562e2a917d9827d3f24ac715a6af7468d627594c90126641349d25b735234f
- 295aef7c1199c1f1ed7d487694e977ec858c5819140ed09808e175fcc49472f0
- 18b8e4782b590141ff10ecde5b76bd1e35d99890a517741ac71408a478a56a81
- 110502c15e51f07fe6aff0b0a28d128d60a1eb51df09a2b9fb2db0775fe92f28
- 0f9a81081fd7ff58c83c78bcfa4735556fd3ad823f917fe28787085f2d309336
- 079de6fa0a294bbab99ca481e03e5d0360cdfae1ab41ffd7cc37a92d7bcc25a1
- 041c9c4e5242464f8661c6f611da14041447b368e7ff669e5de89e9f805ba486
- 75.102.51.237
- 70.34.197.128
- 45.79.137.187
- 45.74.19.84
- 45.56.102.63
- 185.236.228.95
- 216.9.224.70
- 139.144.212.135
- 213.142.149.158
- www.metabaseq.com
- www.autosmtp.com
- https://www.autosmtp.com
- https://www.metabaseq.com/ta588/
- https://cyble.com/blog/threat-actor-employs-powershell-backed-steganography-in-recent-spam-campaigns/
- http://tt.vg/IsjCX
- http://tt.vg/PqPsi
- http://tau.id/ze87s
- http://tau.id/y3kre
- http://tau.id/c9izr
- http://tau.id/34x8c
- http://tau.id/0vzd8
- http://l-to.com/ru7285wa
- http://qr-in.com/HDYwZbx
- http://shtu.be/e79171
- http://139.144.212.135/sbi/microsoftupdationgoingformicrftofficeupgradingtonewmsofficeprotoecoltoreducethesystemwrking.doc.
- http://isols.co/zXTgU
- http://en0.de/serverrrrr
- http://139.144.212.135/222/GST.xn--txt-to0a
- export@bcmsrll.com
- info@bcmsrll.com
- expo@bcmsrll.com
- contact@bcmsrll.com
- biatr.ooguy.com
- withheldforprivacy.com
- vervo.lat
- qr-in.com
- shtu.be
- pluse-tr.com
- naft-dz.shop
- midae.com
- maximum.icu
- laceys.icu
- l-to.com
- isols.co
- executivesship.com
- bcmsrll.com
- baltictransline.store
- bsmsrll.com
- abspedition.icu
- automaxtool.me
- akcalogistics.shop
Attack Patterns
- Agent Tesla - S0331
- Remcos
- TA558
- CVE-2017-11882
Additional Informations
- Finance
- Government
- Belarus
- Russian Federation