TA569 is a malware distributor that has been utilizing fake browser updates for over five years to deliver the SocGholish malware, according to cybersecurity firm Proofpoint. The threat actor has employed various methods to direct traffic from compromised websites to their controlled domains. In one notable instance last fall, TA569 compromised more than 250 US newspaper websites and served SocGholish malware to the publications' readers through malicious JavaScript-powered ads and videos. The malware, once in the system, can steal personal information, disrupt operations, or hold data for ransom.
The threat actor uses sophisticated techniques such as Parrot TDS to obfuscate its injected code and apply filtering before routing requests to the Stage 2 domains. If a user downloads what they believe to be a regular update but the attacker is TA569, they inadvertently download the signature "SocGholish" initial access malware. Screenshots captured by security researcher Jerome Segura illustrate how TA569 and another cluster, "FakeSG," also known as "RogueRaticate," deploy fake updates.
Proofpoint's senior manager of threat research, Daniel Blackford, has highlighted the ongoing activity of TA569 and the difficulties customers face in understanding and remediating the threat independently. The trend of using fake browser updates to distribute malware was initiated by TA569 and has since been adopted by at least four different threat clusters, indicating a growing and persistent trend. Other threat actors such as RogueRaticate (FakeSG), ZPHP (SmartApeSG), and EtherHiding are also known to employ similar tactics. Over the recent years, multiple groups including TA569 have been observed using the software as a Remote Access Trojan (RAT).
Description last updated: 2024-05-04T17:15:31.730Z