TA829 And UNK_GreenSec Share Tactics And Infrastructure In Ongoing Malware Campaigns - Cybernoz - Cybersecurity News
6 Articles
6 Articles
TA829 and UNK_GreenSec share tactics and infrastructure in ongoing malware attacks
TA829 Hackers Use New TTPs and Enhanced RomCom Backdoor to Evade Detection
The cybercriminal group TA829, also tracked under aliases like RomCom, Void Rabisu, and Tropical Scorpius, has been observed deploying sophisticated tactics, techniques, and procedures (TTPs) alongside an updated version of its infamous RomCom backdoor, now dubbed SingleCamper (aka SnipBot). This group, known for blending financially motivated cybercrime with espionage campaigns often aligned with Russian state […] The post TA829 Hackers Use New…
TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns
Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the
State espionage and organised cybercrime are increasingly going hand in hand. Two groups of hackers show how difficult it has become to clearly assign perpetrators – and how sophisticated their methods are. Threat in a Twin Pack The boundaries between cybercrime and cyberspionage are blurring rapidly – a trend that the current Threat blog of the security company Proofpoint highlights. Focus: Two groups targeting companies worldwide with sophisti…
Coverage Details
Bias Distribution
- There is no tracked Bias information for the sources covering this story.
To view factuality data please Upgrade to Premium