{"id":4791,"date":"2025-07-01T17:11:50","date_gmt":"2025-07-01T17:11:50","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns\/"},"modified":"2025-07-01T17:11:50","modified_gmt":"2025-07-01T17:11:50","slug":"ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns\/","title":{"rendered":"TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns"},"content":{"rendered":"<p>\u200bCybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader.<br \/>\nEnterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the\u00a0Cybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader.<br \/>\nEnterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is also known by the\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bCybersecurity researchers have flagged the tactical similarities between the threat actors behind the RomCom RAT and a cluster that has been observed delivering a loader dubbed TransferLoader. Enterprise security firm Proofpoint is tracking the activity associated with TransferLoader to a group dubbed UNK_GreenSec and the RomCom RAT actors under the moniker TA829. The latter is&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/07\/01\/ta829-and-unk_greensec-share-tactics-and-infrastructure-in-ongoing-malware-campaigns\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">TA829 and UNK_GreenSec Share Tactics and Infrastructure in Ongoing Malware Campaigns<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4792,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4791"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4791"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4791\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4792"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}