Financial

Security Brief: ‘Tis the Season for Tax Hax 

Share with your network!

What happened 

Proofpoint researchers recently identified the return of TA576, a cybercriminal threat actor that uses tax-themed lures specifically targeting accounting and finance organizations. This actor is typically only active the first few months of the year during U.S. tax season, generally targeting organizations in North America with low-volume email campaigns. In all campaigns, the actor will email requests for tax preparation assistance and will attempt to deliver remote access trojans (RATs). 

In the first two observed campaigns in January 2024, the actor used a compromised account to send benign emails purporting to request tax assistance. While the sender account was compromised, the emails featured a reply-to address with a recently registered domain that is likely owned by the threat actor. The threat actor provided a backstory and asked for pricing and availability. If the target replied, the threat actor responded with a malicious Google Firebase (web.app) URL.  

Figure 1

Tax-themed lure used by TA576.  

If the URL was clicked, it redirected to the download of a zipped shortcut (LNK) file. If this shortcut was executed, it ran encoded PowerShell via the SyncAppvPublishingServer.vbs LOLBAS inject. The PowerShell command launched Mshta to run the HTML application (HTA) payload from a provided URL. Living Off The Land Binaries, Scripts and Libraries (LOLBAS) techniques are becoming increasingly popular among cybercriminal threats. 

Figure 2

Example shortcut target.  

The code takes a sequence of numerical values, subtracts a number from each (in this case 593), and converts each result to a character using the [char] type casting, and concatenates the characters into a string stored in the variable $k. Interestingly, the number subtracted differs from shortcut to shortcut. 

The HTA payload ran a PowerShell command to AES decrypt and decompress another command that downloaded an executable to the %appdata% folder and ran it. This technique is similar to one previously documented by SANS ISC. The executable in the TA576 campaign used the "Heaven's Gate" evasion technique to run Parallax RAT.  

Attack chain summary: Benign Message > Target Reply > Actor Reply with web.app URL > Redirect > ZIP > LNK > SyncAppvPublishingServer.vbs LOLBAS > PowerShell > MSHTA runs HTA from URL > Encrypted PowerShell > Obfuscated PowerShell > Download and Run EXE 

TA576’s 2024 campaigns are notable as this is the first time Proofpoint observed the actor delivering Parallax RAT. Additionally, the actor’s attack chain using LOLBAS techniques and multiple PowerShell scripts is distinctly different from previously observed campaigns that used URLs to zipped JavaScript payloads or macro-enabled Microsoft Word documents.  

Attribution 

TA576 is a cybercriminal threat actor. Proofpoint has tracked TA576 since 2018 through spam email creation techniques, malware usage, malware delivery techniques and other characteristics. This actor uses tax lures containing similar characteristics and themes during the U.S. tax season to deliver and install RATs. TA576’s follow-on objectives are unknown. While the most frequently observed sectors targeted include accounting and financial entities, Proofpoint has also observed targeting of related industries such as legal.  

Why it matters 

TA576's annual tax-themed campaigns serve as a recurring reminder that cybercrime threat actors will capitalize on seasonal events. They are also an early indicator that other threat actors are likely to incorporate this theme into their campaigns as tax season progresses. In fact, Proofpoint has observed at least one other threat actor – TA558 – and other unattributed threat clusters adopt tax themes this month, and researchers are expecting to see more through April 2024.  

Additionally, TA576’s unique attack chain demonstrates behaviors that are increasingly used by cybercrime threat actors, including “living off the land” techniques using existing scripts and services on a host to conduct malicious activities and chaining multiple PowerShell scripts together before the final payload execution. This is part of the trend featuring more creativity and attack chain experimentation among cybercrime threat actors.  

Example Emerging Threats signatures 

2044450 – ET MALWARE Parallax CnC Response Activity M18 

2044449 – ET MALWARE Parallax CnC Activity M18 (set) 

2047156 – ET MALWARE [ANY.RUN] Parallax RAT Check-In 

Indicators of compromise 

Indicator  

Description 

First Observed 

bvillegas@mountain-alliance[.]com 

TA576 Reply-to Email Address 

23 January 2024 

hxxps://redirectit1[.]web[.]app/ 

URL in Emails 

23 January 2024 

hxxps://uploadfile2024[.]web[.]app/2023-FILES-MY1040-w2[.]zip 

Redirect Target Example 

23 January 2024 

hxxps://2023-w2[.]web[.]app/2023-w2[.]zip 

Redirect Target Example 

23 January 2024 

hxxps://g3w2host[.]web[.]app/G3w2 

HTA Payload 

23 January 2024 

hxxps://sacmuo[.]web[.]app/ 

URL in Emails 

24 January 2024 

hxxps://files-accl[.]zohopublic[.]eu/public/workdrive-public/download/dcyo813923950520542f6bba4f49d89fddf2d?x-cli-msg=%7B%22isFileOwner%22%3Afalse%2C%22version%22%3A%221[.]0%22%7D 

Redirect Target Example 

24 January 2024 

hxxps://charitytechw[.]com/Knitste12 

HTA Payload 

24 January 2024 

hxxps://charitytechw[.]com/sew1[.]exe 

PowerShell Payload Parallax RAT EXE 

24 January 2024 

193[.]142[.]146[.]101:20190 

Parallax RAT C2 

24 January 2024 

f6c901d8959b26428c5fbb9b0c4a18be2057bb4d22e85bfe2442c0a8744a9ff6 

Parallax RAT SHA256 

24 January 2024 

Subscribe to the Proofpoint Blog