July 9, 2019 By David Bisson 2 min read

Security researchers observed the TA505 threat group delivering two new payloads, the Gelup malware tool and the FlowerPippi backdoor, via spam campaigns.

Trend Micro detected the spam campaign on June 20 targeting users in Japan, the Philippines and Argentina. The attackers crafted their emails to deliver DOC and XLS files containing malicious Visual Basic for Applications (VBA) macros. These scripts, in turn, downloaded FlowerPippi malware, which functioned as a backdoor on infected machines.

That’s not all Trend Micro found. In their analysis of FlowerPippi, the researchers discovered that the spam campaign pushed out another new malware tool called Gelup. Written in C++ and designed to function as a downloader of other malware, Gelup stood out for its obfuscation techniques. Gelup can also bypass User Account Control (UAC) by mocking trusted directories, abusing auto-elevated executables and using the Dynamic Link Library (DLL) side-loading technique.

A Busy Year for the TA505 Threat Group

Gelup — detected by Proofpoint as AndroMut — and FlowerPippi are just some of TA505’s latest innovations. In January, Proofpoint observed the threat group using two new malware tools — the ServHelper backdoor and the FlawedGrace remote access Trojan (RAT) — to target banks, retail businesses and restaurants.

Just a few months later, Cybereason detected a campaign launched by the group that used living-off-the-land binaries (LOLBins) and legitimate Windows operating system (OS) processes to deliver ServHelper.

Around that same time, Trend Micro discovered a campaign in which the threat actor targeted users in Chile and Mexico with samples of the FlawedAmmyy RAT and RMS RAT malware families.

Embrace a Layered Approach to Spam Detection

To help defend against TA505 and its ever-expanding arsenal of malware, start by creating a layered approach to email security that consists of mail scanning, antispam filters and security awareness training. Security teams should also use ahead-of-threat detection to block potentially malicious domains before they become active in phishing attacks and other campaigns.

More from

Risk, reward and reality: Has enterprise perception of the public cloud changed?

4 min read - Public clouds now form the bulk of enterprise IT environments. According to 2024 Statista data, 73% of enterprises use a hybrid cloud model, 14% use multiple public clouds and 10% use a single public cloud solution. Multiple and single private clouds make up the remaining 3%.With enterprises historically reticent to adopt public clouds, adoption data seems to indicate a shift in perception. Perhaps enterprise efforts have finally moved away from reducing risk to prioritizing the potential rewards of public cloud…

Cybersecurity Awareness Month: Horror stories

4 min read - When it comes to cybersecurity, the question is when, not if, an organization will suffer a cyber incident. Even the most sophisticated security tools can’t withstand the biggest threat: human behavior.October is Cybersecurity Awareness Month, the time of year when we celebrate all things scary. So it seemed appropriate to ask cybersecurity professionals to share some of their most memorable and haunting cyber incidents. (Names and companies are anonymous to avoid any negative impact. Suffering a cyber incident is bad…

Is AI saving jobs… or taking them?

4 min read - Artificial intelligence (AI) is coming to take your cybersecurity job. Or, AI will save your job. Well, which is it? As with all things security-related, AI-related and employment-related, it's complicated. How AI creates jobs A major reason it's complicated is that AI is helping to increase the demand for cybersecurity professionals in two broad ways. First, malicious actors use AI to get past security defenses and raise the overall risk of data breaches. The bad guys can increasingly use AI-based…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today