CyberInt Reports: Suspected Russian-speaking Threat Actors 'TA505' Continues Cybercrime Spree against Global Retailers & Financial Institutions

Latest tactic is using legitimate remote access software delivered via phishing attemptsTEL AVIV, Israel, April 17,A 2019 /PRNewswire/ -- Investigation from CyberInt's Research Lab has connected a single gang to a range of attacks against retailers and financial institutions around the world using legitimate remote access software. CyberInt's managed detection and response solutions protect the world's leading companies.The group has used the same tactics, techniques and procedures (TTPs) along with the repeated nefarious, unauthorized use of an off-the-shelf commercial remote administration tool, "Remote Manipulator System" (RMS), developed by a Russian-based company. They were behind attacks against the global financial industry between December 2018 and February 2019, launching campaigns against financial institutions in Chile, India, Italy, Malawi, Pakistan,A and South Korea, among others; and December 2018 campaigns against US-based retailers. Campaigns are continuing today. The financially motivated TA505A has been active since 2014, when they beganA high-volume malicious email campaigns, including the distribution of the "Dridex"A and "Shifu" banking trojans as well as the Neutrino botnet/exploit kit and Locky ransomware.The members of TA505 are thought to be native Russian speakers, based on analysis of their code. CyberInt's Research Lab discovered the attack thanks to its outside-in approach, where it seeks out threats before they enter the organization. CyberInt's machine learning-based AI detection platform automatically sorts through hundreds of thousands of events across the Internet and darknet and deep web, bringing specific patterns to the attention of cyber-analysts, who further investigate the TTPs and their impact on CyberInt's customers."Although they are using phishing and social engineering to get the software into the organizations, once its installed, it's virtually undetectable by traditional threat protection systems because it's legitimate software," says Adi Peretz, Senior Strategic Consultant andA HeadA of ResearchA at CyberInt. "They are still very much active. This is only the beginning of our deep-dive investigation."Our 'white hat-hacking approach' makes it critical that we reveal their TTPs so organizations can better prepare themselves. Signature detection doesn't work, but if you focus on training your employees to avoid their modus operandi, you have a greater chance of protecting your organization."CyberInt recommends adoption of a machine learning technology platform that is tailored to the individual business' specific requirements, where analysts determine in advance for which types of threats they need to mitigate first.Download the full report.About CyberInt
CyberIntA uses agile business-centered insight and action to transform cybersecurity into a business enabler.A CyberInt delivers the only platform combining cyber expertise and profound business understanding to deliver insights and actions that protect what matters most: the business goals, customers, employees, and brand.A  CyberInt serves top retail, finance, and gaming organizations around the world and has developed a deep understanding of the threats, needs, and behaviors particular to each industry. www.cyberint.comMedia ContactAmy Kenigsberg
K2 Global Communications
tel: +972-9-794-1681 (+2 GMT)
mobile: +972-524-761-341
U.S.: +1-913-440-4072 (+7 ET)
See also:
Leave a comment
  • Latest
  • Read
  • Commented
Calendar Content
«    Июль 2019    »