The risk actor tracked as TA558 has been noticed leveraging steganography as an obfuscation method to ship a variety of malware equivalent to Agent Tesla, FormBook, Remcos RAT, LokiBot, GuLoader, Snake Keylogger, and XWorm, amongst others.
“The group made in depth use of steganography by sending VBSs, PowerShell code, in addition to RTF paperwork with an embedded exploit, inside pictures and textual content information,” Russian cybersecurity firm Optimistic Applied sciences said in a Monday report.
The marketing campaign has been codenamed SteganoAmor for its reliance on steganography and the selection of file names equivalent to greatloverstory.vbs and easytolove.vbs.
A majority of the assaults have focused industrial, companies, public, electrical energy, and development sectors in Latin American nations, though firms situated in Russia, Romania, and Turkey have additionally been singled out.
The event comes as TA558 has additionally been noticed deploying Venom RAT by way of phishing assaults geared toward enterprises situated in Spain, Mexico, america, Colombia, Portugal, Brazil, Dominican Republic, and Argentina.
All of it begins with a phishing electronic mail containing a booby-trapped electronic mail Microsoft Excel attachment that exploits a now-patched safety flaw in Equation Editor (CVE-2017-11882) to obtain a Visible Primary Script that, in flip, fetches the next-stage payload from paste[.]ee.
The obfuscated malicious code takes care of downloading two pictures from an exterior URL that come embedded with a Base64-encoded part that in the end retrieves and executes the Agent Tesla malware on the compromised host.
Past Agent Tesla, different variants of the assault chain have led to an assortment of malware equivalent to FormBook, GuLoader, LokiBot, Remcos RAT, Snake Keylogger, and XWorm, that are designed for distant entry, information theft, and supply of secondary payloads.
The phishing emails are despatched from legitimate-but-compromised SMTP servers to lend the messages a bit of credibility and reduce the possibilities of them getting blocked by electronic mail gateways. As well as, TA558 has been discovered to make use of contaminated FTP servers to stage the stolen information.
The disclosure comes towards the backdrop of a collection of phishing assaults focusing on authorities organizations in Russia, Belarus, Kazakhstan, Uzbekistan, Kyrgyzstan, Tajikistan, and Armenia with a malware dubbed LazyStealer to reap credentials from Google Chrome.
Optimistic Applied sciences is monitoring the exercise cluster below the title Lazy Koala in reference to the title of the person (joekoala), who is alleged to manage the Telegram bots that obtain the stolen information.
That stated, the sufferer geography and the malware artifacts point out potential hyperlinks to a different hacking group tracked by Cisco Talos below the title YoroTrooper (aka SturgeonPhisher).
“The group’s principal software is a primitive stealer, whose safety helps to evade detection, decelerate evaluation, seize all of the stolen information, and ship it to Telegram, which has been gaining reputation with malicious actors by the yr,” safety researcher Vladislav Lunin said.
The findings additionally observe a wave of social engineering campaigns which might be designed to propagate malware households like FatalRAT and SolarMarker.



