{"id":24271,"date":"2023-05-08T03:19:38","date_gmt":"2023-05-08T03:19:38","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=24271"},"modified":"2026-04-17T18:07:41","modified_gmt":"2026-04-17T18:07:41","slug":"ta569-suspected-of-phishing-attack-against-russia-and-germany","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/","title":{"rendered":"TA569 Suspected of Phishing Attack against Russia and Germany"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">I. Overview<\/h1>\n\n\n\n<p>On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation analysis of the event, NSFOCUS Security Labs confirmed that the attacker also launched a similar phishing attack against Germany.<\/p>\n\n\n\n<p>The active time of the attacker, the attack target, the type of tool used, and the characteristics of the tool are highly similar to those of the known hacker group TA569. This attack may be a continuation of a series of activities launched by this group in February 2023.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">II. About TA569<\/h1>\n\n\n\n<p>TA569 is a prolific hacker group that engages in a variety of financial cybercrimes. It is a well-funded and well-organized group that may operate in Russia or Eastern Europe. The early activities of TA569 date back to 2020, and attack activities typically include phishing, website injections, and malware (such as bank Trojans) to steal financial information of individuals and organizations.<\/p>\n\n\n\n<p>The main attack tools for the TA569 include a web loader called SocGholish, the bank Trojan Chthonic, the remote control software NetSupport, and a variety of commercial Trojans.<\/p>\n\n\n\n<p>Known targets for TA 569 include Russia, Canada, France, Germany, Spain, Italy, the UK, and the United States.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">III. Decoy Information<\/h1>\n\n\n\n<p>In this event, the TA569 attacker exploited the document containing the CVE-2017-0199 vulnerability to download and open the remote document. Use the prompts in the document content to induce its target to enable the macro. This will cause the malicious macro code in the document to be executed, and trigger execution of the final load after ps1 script is downloaded and executed.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-1..jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-1..jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24274\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 1. Phishing Document Used by TA569<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">IV. Attack Process<\/h1>\n\n\n\n<p>In this event, the attack process built by the attacker mainly includes the following stages:<\/p>\n\n\n\n<p>1.  An attacker exploits the CVE-2017-0199 vulnerability to download and execute remote documents with malicious macrocode.<\/p>\n\n\n\n<p> 2. The user clicks Enable Macro to execute the macro code. The function is to call the Powershell command to download Newfile.zip from the specified location. After decompression, the script is script.ps1. Use the Powershell command to execute the script.<\/p>\n\n\n\n<p>3. The executed Powershell script downloads the final payload &acirc;&euro;&ldquo; NetSupport remote control program, and decompresses and executes the program.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-1024x531.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24276\" width=\"703\" height=\"364\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-1024x531.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-300x156.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-768x398.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-1536x796.png 1536w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-600x311.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2-200x104.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-2.png 1595w\" sizes=\"(max-width: 703px) 100vw, 703px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 2. Recovery Attack Process of the TA569 Event<\/p>\n\n\n\n<p>In this suspected TA569 attack on Russia, the group delivered a CVE-2017-0199 vulnerability file and attacked Russia with a Russian decoy file.<\/p>\n\n\n\n<p>After running the vulnerability file, the victim will download and execute the remote file newf.dotm. After opening, the victim will execute a malicious macrocode to access the release server to download malicious files, and release and run the subsequent the script.ps1.<\/p>\n\n\n\n<p>The macro code used in newf.dotm is shown in the following figure:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-3..jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-3..jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24278\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 3. Malicious Macro Code<\/p>\n\n\n\n<p class=\"has-text-align-left\"><br>The main function of the macro code is to convert the hexadecimal string into ASCII code and then execute the shell. The shell is the script of Powershell encoded by Base64. After decoding, it is shown in the following figure:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-4..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-4..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24280\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 4. Decoded PowerShell Command<\/p>\n\n\n\n<p class=\"has-text-align-left\">The main function of the Powershell command shown above is to create the Temp folder and put C:\\Temp \\ and AppData\\Roaming into the Windows Defender exclusion to bypass the Windows Defender. Download the compressed file from the release server to the C:\\Temp \\&#8221; directory, decompress and run the script.ps1.<\/p>\n\n\n\n<p>The main purpose of the Script.ps1is to download and decompress the compressed package from another server and store it in the OneDrveSync directory newly added to AppData\\Roaming, and set this directory to be hidden to reduce the possibility of discovery.<\/p>\n\n\n\n<p>Finally, jump to the OneDrveSync directory to run the final payload client.exe (NetSupport remote control software) and add the directory to the registry Run value for persistence. The following figure shows the contents of the script.ps1:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-5..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-5..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24282\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 5. Contents in Script.ps1<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">V. Functions of Trojan<\/h1>\n\n\n\n<p>The group uses open source software NetSupport as a remote control tool. The software has been abused since 2018. NetSupport is a powerful remote management tool that helps users easily manage and monitor computer devices through the network. It provides many functions, mainly including remote control and screen sharing, obtaining computer equipment information and software list, file transfer, etc.<\/p>\n\n\n\n<p>NetSupport transmits network data through encryption, and the encryption key can be defined by the user in the configuration file.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-6..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-6.-1024x414.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24284\" width=\"810\" height=\"327\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 6. NetSupport Software<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">VI. Related Events<\/h1>\n\n\n\n<p>In this event, the NetSupport used by the attacker carries a special traffic encryption key, as shown in the following figure:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-7..jpg\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-7..jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24286\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 7. Private Key in NetSupport License<\/p>\n\n\n\n<p class=\"has-text-align-left\">By querying the NetSupport license information and configuration information, NSFOCUS Security Labs found that the attacker initiated a similar attack with the same NetSupport program key. The specific attack process was consistent with that of this event, but the content in the decoys at all levels was in German. For example, &#8220;Rechnung herunterladen&#8221; (download invoice), &#8220;brennholz_125313&#8221; (firewood_125313), etc., it is speculated that the direct targets are enterprises engaged in trade in Germany.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-8-1..png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Fig-8-1..png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24290\"><\/a><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center has-small-font-size\">Figure 8. German Script Used by Attacker<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">VII. Group Correlation<\/h1>\n\n\n\n<p>This event has overlapping characteristics with the group TA569 in the following aspects:<\/p>\n\n\n\n<p><strong>Attack target<\/strong><br>In this event, the main targets of the attacker are enterprises in Russia and Germany, and the target range overlaps with TA569. In addition, because there are fewer hacker groups targeting both countries, the linkage of the attacker with TA569 is further closed;<\/p>\n\n\n\n<p><strong>Attack time<\/strong><br>The recent active period of TA569 is from the end of 2022 to the first quarter of 2023, which is relatively close to the actual occurrence time of this group of attacks;<\/p>\n\n\n\n<p><strong>Attack tool<\/strong><br>In this event, the Trojan program selected by the attacker is NetSupport. Although the Trojan is a commercial remote tool and has been abused, it is rarely used by known threat actors except TA569 and TA505.<\/p>\n\n\n\n<p><strong>Trojan characteristics<\/strong><br>The NetSupport program that appeared in this event contains specific license information HANEYMANEY and NSM 385736, which is consistent with the information in NetSupport used by TA569. Considering that NetSupport has a leaked version that has been abused, this is not conclusive evidence.<\/p>\n\n\n\n<p><strong>CnC Domain Name Format<\/strong><br>The CnC domain name format of the Trojan program used by the attacker is similar to that of the known Trojan program of TA569, as shown in the following table:<br><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.-.png\"><img decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--1024x160.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-24272\" width=\"699\" height=\"109\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--1024x160.png 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--300x47.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--768x120.png 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--600x94.png 600w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.--200x31.png 200w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/Table-1.-.png 1315w\" sizes=\"(max-width: 699px) 100vw, 699px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p>It can be inferred from this clue that the attacker of this event has a strong correlation with TA569.<br><\/p>\n\n\n\n<p>To sum up, there is a high likelihood that the attacker of this event is TA569.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">VIII. IoCs<\/h1>\n\n\n\n<p>81321adeacc1908b7a3a631e78a803e5c8c3a0fa2dd6963a84ebaffebc027604<br>9969a0b62356c03aecf524ba69c136e675792b435eaf604c12dc5d36ed9c8aae<br>7f6520e339bf0bf4cf19d053e95c829d5fde2a71947c78393696c82758997f53<br>2c3b87c820cdae0cf08142f9be12bb5a0aac19692956e631df3f627018e2ff42<br>393083e8ac5c9bb71109b1821e89ef142f816418ed5cbff90fb0d0062b378454<br>7674ae1f32b023a07d882a0505ae8995c6ce8516d07728e1af5315098f906fcc<br>944f56b306f67feba5dbf3b828181da056477b07a1decb1700607c1d3cf40e20<br>26cad4ec29bc07d7b2c32c94dbbef397391babf1c78cc533950b325aaf11bba8<br>445da7c0f861bca8d8432bf693748870d4bcba3c2d1dcaebecb833fb7b435840<br>de6a89f52103b1d03b5c2f27c9c04aac06b7d7b486469e5fca0de02c0f8d71de<\/p>\n\n\n\n<p>glazgo142.com:1935<br>glazgo141.com:1935<br>balbalz1.com:5222<br>balbalz2.com:5222<br>allenew1.com:2552<br>allenew2.com:2552<\/p>\n\n\n\n<p>GSK=GF&lt;MABEF9G?ABBEDHG:H<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>I. Overview On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation analysis of the event, NSFOCUS Security Labs confirmed that the attacker also launched a similar phishing attack against Germany. The active time of the attacker, the attack target, the type of tool used, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":24298,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3],"tags":[93],"class_list":["post-24271","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-apt"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"I. Overview On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-08T03:19:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"I. Overview On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"TA569 Suspected of Phishing Attack against Russia and Germany\",\"datePublished\":\"2023-05-08T03:19:38+00:00\",\"dateModified\":\"2026-04-17T18:07:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/\"},\"wordCount\":1248,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/feature-image-1.png\",\"keywords\":[\"APT\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/\",\"name\":\"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/feature-image-1.png\",\"datePublished\":\"2023-05-08T03:19:38+00:00\",\"dateModified\":\"2026-04-17T18:07:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/feature-image-1.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/feature-image-1.png\",\"width\":580,\"height\":343,\"caption\":\"Hacker illustration with \\\"Attack Analysis\\\" text.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/ta569-suspected-of-phishing-attack-against-russia-and-germany\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TA569 Suspected of Phishing Attack against Russia and Germany\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS","og_description":"I. Overview On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation","og_url":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/","og_site_name":"NSFOCUS","article_published_time":"2023-05-08T03:19:38+00:00","article_modified_time":"2026-04-17T18:07:41+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS","twitter_description":"I. Overview On April 18, 2023, NSFOCUS Security Labs discovered a spear phishing attack against Russia during daily threat hunting. After correlation","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"TA569 Suspected of Phishing Attack against Russia and Germany","datePublished":"2023-05-08T03:19:38+00:00","dateModified":"2026-04-17T18:07:41+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/"},"wordCount":1248,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","keywords":["APT"],"articleSection":["Blog"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/","url":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/","name":"TA569 Suspected of Phishing Attack against Russia and Germany - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","datePublished":"2023-05-08T03:19:38+00:00","dateModified":"2026-04-17T18:07:41+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2023\/05\/feature-image-1.png","width":580,"height":343,"caption":"Hacker illustration with \"Attack Analysis\" text."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/ta569-suspected-of-phishing-attack-against-russia-and-germany\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"TA569 Suspected of Phishing Attack against Russia and Germany"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24271","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=24271"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/24271\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/24298"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=24271"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=24271"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=24271"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}