The menace actor TA547 has been noticed concentrating on German organizations with the identified stealer Rhadamanthys.
In keeping with a latest report from Proofpoint, that is the primary time this menace actor has been related to such exercise.
What’s notably intriguing based on the researchers is the actor’s obvious employment of a PowerShell script probably generated by massive language fashions (LLMs) corresponding to ChatGPT, Gemini or CoPilot.
Impersonating the well-known German retail firm Metro, TA547 dispatched emails regarding invoices. These emails, despatched to quite a few organizations throughout completely different industries in Germany, contained a password-protected ZIP file harboring an LNK file.
Upon execution, this LNK file triggered PowerShell to provoke a distant script, in the end loading and executing the Rhadamanthys malware instantly into system reminiscence, bypassing the necessity for writing to disk.
Notably, the PowerShell script exhibited traits unusual in typical menace actor or reliable programmer code, indicating attainable LLM involvement. Such elements included grammatically appropriate and hyper-specific feedback above every script element, a trademark of LLM-generated content material.
This marketing campaign showcases TA547’s strategic shift, together with the adoption of compressed LNKs and the introduction of Rhadamanthys. It additionally underscores how menace actors leverage suspected LLM-generated content material of their malicious endeavors.
Learn extra on the implications of LLM-generated content material in cybersecurity: RSA eBook Particulars How AI will Rework Cybersecurity in 2024
In keeping with Proofpoint, nonetheless, whereas menace actors can use LLMs to assist perceive advanced assault chains and doubtlessly improve their campaigns, this doesn’t alter malware’s performance or efficacy. In actual fact, the corporate believes that almost all behavior-based detection mechanisms stay efficient whatever the origin of malicious software program.
“In the identical means LLM-generated phishing emails to conduct enterprise e mail compromise (BEC) use the identical traits of human-generated content material and are caught by automated detections, malware or scripts that incorporate machine-generated code will nonetheless run the identical means in a sandbox (or on a number), triggering the identical automated defenses,” the corporate defined.