Article Details
Scrape Timestamp (UTC): 2024-04-02 05:02:11.320
Source: https://thehackernews.com/2024/04/massive-phishing-campaign-strikes-latin.html
Original Article Text
Click to Toggle View
Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors. The threat actor known as TA558 has been attributed to a new massive phishing campaign that targets a wide range of sectors in Latin America with the goal of deploying Venom RAT. The attacks primarily singled out hotel, travel, trading, financial, manufacturing, industrial, and government verticals in Spain, Mexico, United States, Colombia, Portugal, Brazil, Dominican Republic, and Argentina. Active since at least 2018, TA558 has a history of targeting entities in the LATAM region to deliver a variety of malware such as Loda RAT, Vjw0rm, and Revenge RAT. The latest infection chain, according to Perception Point researcher Idan Tarab, leverages phishing emails as an initial access vector to drop Venom RAT, a fork of Quasar RAT that comes with capabilities to harvest sensitive data and commandeer systems remotely. The disclosure comes as threat actors have been increasingly observed using the DarkGate malware loader following the law enforcement takedown of QakBot last year to target financial institutions in Europe and the U.S. "Ransomware groups utilize DarkGate to create an initial foothold and to deploy various types of malware in corporate networks," EclecticIQ researcher Arda Büyükkaya noted. "These include, but are not limited to, info-stealers, ransomware, and remote management tools. The objective of these threat actors is to increase the number of infected devices and the volume of data exfiltrated from a victim." It also follows the emergence of malvertising campaigns designed to deliver malware like FakeUpdates (aka SocGholish), Nitrogen, and Rhadamanthys. Earlier this month, Israeli ad security company GeoEdge revealed that a notorious malvertising group tracked as ScamClub "has shifted its focus towards video malvertising assaults, resulting in a surge in VAST-forced redirect volumes since February 11, 2024." The attacks entail the malicious use of Video Ad Serving Templates (VAST) tags – which are used for video advertising – to redirect unsuspecting users to fraudulent or scam pages but only upon successful passage of certain client-side and server-side fingerprinting techniques. A majority of the victims are located in the U.S. (60.5%), followed by Canada (7.2%), the U.K. (4.8%), Germany (2.1%), and Malaysia (1.7%), among others. The Strategic Guide to Cloud Security Unlock practical steps to securing everything you build and run in the cloud. Goodbye, Atlassian Server. Goodbye… Backups? Protect your data on Atlassian Cloud from disaster with Rewind's daily backups and on-demand restores. How to Update and Automate Outdated Security Processes Download the eBook for step-by-step guidance on how to update your security processes as your business grows.
Daily Brief Summary
TA558, an established threat actor, launches a large-scale phishing campaign to distribute Venom RAT across various sectors in Latin America.
Targeted sectors include hospitality, finance, manufacturing, and government agencies across Spain, Mexico, the US, Portugal, Brazil, and more.
The campaign employs phishing emails for initial access, leading to sensitive data theft and system control via the Venom RAT malware.
Venom RAT is an offshoot of Quasar RAT known for its data harvesting and remote system command capabilities.
The campaign follows increased use of DarkGate malware loader and various malvertising campaigns post-QakBot takedown, targeting financial institutions in the US and Europe.
Notorious malvertising group ScamClub has pivoted to video advertisement attacks, exploiting VAST tags for redirecting users to scams, with most victims in the US.
Security experts emphasize the importance of enhancing cloud security measures and updating security processes in the face of evolving cyber threats.