Heimdal
article featured image

Contents:

A new custom-made malware, the Screenshotter, surveils the victims before stealing data. The threat actor called TA886 is utilizing this malware to target users from the United States and Germany.

Researchers first spotted the campaign in October 2022, but its activity increased in 2023.

How Screenshotter Malware Works

TA886 has created this malware to be able to evaluate the victims before further intrusion, Proofpoint researchers explain. The threat actor proceeds to data exfiltration only if the attack can bring enough money.

The targeted user receives a phishing email with malicious macros. The email may contain a malicious Microsoft Publisher (.pub) attachment, a link to .pub files with macros, or an infected PDF that downloads JavaScript files.

New Screenshotter Malware Performs Surveillance Before Stealing Data

Source

The victim triggers the attacks by clicking on the links. And the goal of this email is to download and execute the Screenshotter malware. Then the customized malware takes JPG screenshots from the infected device and sends them to its creator.

After manually evaluating the screenshots, the attacker can take two actions. He can demand more JPGs from the malware, or he can drop additional custom payloads.

TA886 uses Rhadamanthys to steal data. This malware family can also steal cryptocurrency wallets, credentials, and cookies, FTP clients, Steam accounts, Telegram and Discord accounts, VPN configurations, and email clients.

The TA886 Threat Actor

It seems that TA886 may be a Russian threat actor. This is based on the hours when he is active, sending commands to the malware, and the presence of Russian language variable names and comments in code lines.

Proofpoint has attempted to find overlaps and similarities with past reports describing similar TTPs (techniques, tactics, and procedures), but it could not make any definitive connections.

Source

In conclusion, Active Directory profiling employed by Screenshotter is very concerning. As this can be used by malicious actors to compromise all domain-joined hosts.

If you liked this article, follow us on LinkedInTwitterFacebookYouTube, and Instagram for more cybersecurity news and topics.

Author Profile

Andreea Chebac

Digital Content Creator

Andreea is a digital content creator within Heimdal® with a great belief in the educational power of content. A literature-born cybersecurity enthusiast (through all those SF novels…), she loves to bring her ONG, cultural, and media background to this job.

Leave a Reply

Your email address will not be published. Required fields are marked *

CHECK OUR SUITE OF 11 CYBERSECURITY SOLUTIONS

SEE MORE