Accessibility links
  • Skip to main content
News Icon NEWS FILTER
All News Security Education Videos Scams & Phishing Your Security Mobile Security Identity Theft Corporate Security
Search Icon SEARCH
 

Email Icon SUBSCRIBE TO WEEKLY NEWSLETTER
Are You Hacker-Bait? Phishing Malware Lets Picky Attackers Decide
Facebook   X   LinkedIn   Email

Are You Hacker-Bait? Phishing Malware Lets Picky Attackers Decide

March 8, 2025

If you’ve ever wondered if you’re a juicy target for a cyberattack, don’t fret because there’s a new malware allowing bad actors to decide that for you. It’s a creepy thought, but there’s a new email phishing campaign installing malware that takes screenshots of a device and its contents and sends them to the hacker. If the data is deemed hack-worthy, it’s the beginning of a financial nightmare for the chosen victims.

Heavily targeting organizations in the U.S., Proofpoint researchers began tracking this phishing campaign last year and find it continues today. They discovered the emails carry TA866 malware known for its screenshot and other nefarious abilities, including espionage.

When TA866 is let loose, it starts snapping pictures of the device contents. Those on the screenshot receiving end decide if what they’re seeing shows promise for financial gain. If so, additional malware infections follow. The added malware facilitates hijacking PII and other useful data, including stealing browser-stored passwords and the contents of crypto wallets.

Proofpoint believes the attacks are financially motivated, and typical attacks involve sending up to tens of thousands of phishing emails, 2-4 times weekly.

Just One Little Phish

The best way to prevent this phishing attack and others from succeeding is recognizing email phishing when you see it. Remember, all it takes to compromise an entire organization is for one employee to enable one phish.

Using 2FA (two-factor authentication), a type of MFA (multi-factor authentication) can save the day. Using 2FA verifies a user is who they claim to be and can prevent an attack from moving forward. MFA blocks 99.9 of automated cyberattacks like email phishing, a great reason to use it.

Password power. Since 81% of hacking-related breaches are due to weak or stolen passwords, creating a strong and unique guardian for different accounts is a cybercrime deterrent. A minimum of 12 randomly chosen letters, numbers, and symbols are advised, and never use whole words or meaningful dates like birthdays and anniversaries. Passwords should never use PII, especially if PII is posted on social media.

Mystery emails. Emails from unknown senders, especially those with attachments or links, should never be acted on. Despite how curiously tempting they may be, they’re better off deleted than trusted. Also, never share PII with those you don’t know, don’t trust, or if you can’t confirm the email sender is legitimate.


Online Security Tips From The BBB

Your Security

Online Security Tips From The BBB

Champions of consumers that they are, the Better Business Bureau (BBB) posted a warning reminder on their website about some of the risky online scenario’s consumers face every day. Keeping cyber safety in the forefront of our online activities isn’t always easy, but it’s always possible to do. The BBB knows this and wants consumers to be aware of some of the latest cyber scams and just how truly slippery they can be. It’s well-worth heeding what the BBB has to say about cybercrime and how to avoid the pitfalls that every hacker hopes we fall into. READ FULL STORY

Protect Yourself From Phishing Scams: 8 Steps To Better Security

Scams & Phishing

Protect Yourself From Phishing Scams: 8 Steps To Better Security

Since the mid 1990’s, email phishing scams have been on the rise. Like most cybercrimes, hackers have improved and refined their phishing methods over time. Now, there’s been a massive increase in targets due to the continuing coronavirus epidemic. Email phishing continues to be the method of choice for many cybercriminals to enter your device, steal your data, identity, finances, and more. A study by Tessian finds that 96% of phishing attacks arrive via email, showing the threat is very real. READ FULL STORY

BOLO for These Most Dangerous Email Attachments

Scams & Phishing

BOLO for These Most Dangerous Email Attachments

Keeping a lookout for suspicious emails has become a daily consequence of our cyber lives. Phishing emails are notorious for having malicious attachments and opening them is a sure way to compromise your device and its data. These attachments are full of malware, ready and waiting to infect your system with a simple click. Make no mistake, any attachment in a questionable email can be dangerous. However, researchers at F-Secure found that some of this year’s biggest email spam campaigns used particular types of malicious attachments more than others. READ FULL STORY

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

Scams & Phishing

Common Signs Of Phishing To Keep In Mind When Your Inbox Overflows

With email phishing, deciphering what’s real from what’s fake can be a challenge. Our inboxes are stuffed with emails fighting to get our attention and get us to take some action. But how to ferret-out what’s legitimate takes some cyber-smarts. Research shows email is the primary method of spreading 92% of all malware, and the U.S. is the target of 86% of all email phishing attacks. Whether at home or at work, email phishing is relentless, but being aware of characteristics they have in common can be a powerful tool. READ FULL STORY








Close
Fraud News & Alerts!

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates. Each week you will receive an email containing the latest cyber security news, tips and breach notifications.



You're all set!

You will receive your first official security update email within the next week.

A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.


 
Help  
Enter any word or words you like.        

The email newsletter will arrive from news@stickleyonsecurity.com


Loading
Please wait...