Just shy of a week after Microsoft squeezed cyber criminals out of the prolific Necurs botnet infrastructure, threat actors like TA505 still maintain a foothold on networks throughout the world.
Findings from Prevailion’s compromise intelligence platform on Wednesday showed the IP addresses TA505 have actively infected around the globe.
Prevailion’s Chief Data Scientist Nate Winslow shared a map of this activity, along with his insight of the findings, on LinkedIn today.
“Cyber crime is not slowing down because of COVID-19. The TA505 group is a prime example we see in our data. If you are not familiar with TA505, they are a financially motivated advanced threat actor with a global reach (see graphic). They have malware in hospitals, banks, and schools. They are NOT good people and they have solid technical skills.”
TA505, also known as Evil Corp, has diversified their attacks on global businesses, incorporating a variety of schemes. One recently uncovered by Prevailion’s Tailored Intelligence team shows how they used trojanized resumes to compromise unsuspecting German businesses. Read the team’s full report to learn more about this attack, and how to protect your organization from becoming a victim.
Anyone can get visibility of compromises like this by trying Prevailion for free today.
A member of the FCC renewed urgency calls on Apple and Google to remove TikTok from their app stores, raising concerns that TikTok’s Chinese-based parent company is collecting user data that is being accessed in China.
What Wicked Webs We Un-weave: Wizard Spider once again proving it isn’t you, it isn’t me; we search for things that you can’t see Authored by: Matt Stafford and Sherman Smith Executive summary: In late January 2022, Prevailion’s Adversarial Counterintelligence Team (PACT) identified extensive phishing activity designed to harvest credentials for Naver. Naver is a […]