New Email Scam Targets NTLM Hashes in Covert Data Theft Operation

New Email Scam Targets NTLM Hashes in Covert Data Theft Operation

TA577 has been identified as a notorious threat actor who orchestrated a sophisticated phishing campaign, according to researchers at security firm Proofpoint. Currently, the group is utilizing a new method of phishing involving ZIP archive attachments. This tactic is geared towards pilfering the hash data of NT LAN Manager (NTLM) users. According to our investigation, this group is utilizing a chain of attacks aimed at stealing authentication information from the NT LAN Manager (NTLM) system.

It would be possible to exploit this method for obtaining sensitive data and facilitating further malicious activity if this method were to be exploited. 


By using booby-trapped email attachments containing booby-trapped NTLM hashes to steal employees’ NTLM hashes, a threat actor that is known for establishing initial access to organizations’ computer systems and networks is using these attachments to steal employees’ hashes. Earlier this week, enterprise security firm Proofpoint published a report that suggested that the new attack chain “is capable of gathering sensitive information and facilitating follow-on activities.”  As reported by the company, at least two phishing campaigns have utilized this approach since February 26, 2024, when thousands of messages were distributed worldwide and hundreds of organizations were targeted. As an initial access broker (IAB), TA577 has previously been associated with Qbot and h

[…]Content was cut in order to protect the source.Please visit the source for the rest of the article.



This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article:



Liked it? Take a second to suppor ..

Support the originator by clicking the read the rest link below.