#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

28 C
Dubai
Sunday, June 1, 2025
HomeIndustriesBanking & FinanceInvoice Intrigue: TA547 Targets German Firms with Rhadamanthys Stealer

Invoice Intrigue: TA547 Targets German Firms with Rhadamanthys Stealer

Date:

Related stories

spot_imgspot_imgspot_imgspot_img

German organizations are on high alert following a phishing campaign targeting them with a novel information stealer. The culprit? A financially motivated threat actor group known as TA547.

Let’s dissect this campaign, understand the Rhadamanthys stealer, and explore best practices to safeguard your organization from similar threats.

TA547: A Persistent Threat Actor

TA547 is a prolific cybercriminal group with a history of targeting various regions with email phishing campaigns. Known for their flexibility, they’ve utilized malware like ZLoader, Gootkit, DanaBot, Ursnif, and even Adhlam-Shim ransomware in past attacks. This latest campaign, however, marks a shift in their tactics.

Rhadamanthys Stealer: A New Face in the Game

This campaign leverages the Rhadamanthys stealer, a malware program not previously linked to TA547. Rhadamanthys specializes in siphoning sensitive information from compromised systems, including:

  • Login credentials
  • Financial data
  • Personal information
  • Corporate data

Dissecting the Phishing Campaign

TA547’s emails are crafted to appear legitimate, often mimicking invoices from trusted vendors. These emails typically contain a password-protected ZIP file with a decoy filename (e.g., MAR26.zip) designed to trick recipients into lowering their guard. Once extracted, the ZIP file contains an LNK (link) file. Clicking this LNK triggers a PowerShell script that downloads and executes the Rhadamanthys stealer payload in memory, bypassing traditional disk-based detection methods.

Proofpoint Discovers the Deception

Security researchers at Proofpoint were the first to identify this campaign, highlighting TA547’s evolving tactics and their possible use of large language models (LLMs) to generate the malicious PowerShell scripts. This incident underscores the need for continuous vigilance and advanced threat detection solutions.

10 Ways to Fortify Your Defenses

Here are 10 actionable steps organizations can take to protect themselves from phishing attacks like the one employed by TA547:

  1. Educate Employees: Train employees on phishing tactics, red flags to watch for, and best practices for handling suspicious emails.
  2. Implement Email Security Solutions: Utilize email filtering and security solutions that can detect phishing attempts and malicious attachments.
  3. Enforce Secure Email Gateways: Configure secure email gateways to scan incoming and outgoing emails for malware and suspicious content.
  4. Disable Macros: Disable macros in Microsoft Office documents by default to prevent malicious scripts from executing.
  5. Implement Multi-Factor Authentication (MFA): Enforce MFA wherever possible to add an extra layer of security beyond passwords.
  6. Maintain Software Updates: Ensure all systems are updated with the latest security patches to address known vulnerabilities.
  7. Segment Your Network: Implement network segmentation to limit the potential impact of a successful phishing attack.
  8. Maintain Backups: Regularly back up critical data to facilitate recovery in case of a cyberattack.
  9. Simulate Phishing Attacks: Conduct regular phishing simulations to test employee awareness and preparedness.
  10. Stay Informed: Subscribe to cybersecurity advisories and news sources to stay updated on emerging threats and tactics.

Conclusion

The TA547 phishing campaign targeting German firms with the Rhadamanthys stealer serves as a stark reminder that cybercriminals are constantly refining their methods. By prioritizing employee education, implementing robust security solutions, and fostering a culture of cybersecurity awareness, organizations can significantly reduce their risk of falling victim to such attacks.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here