Comprehensive Threat Exposure Management Platform
TA584 is a long-running initial access broker active since 2020 that conducts large-scale phishing campaigns using ClickFix social engineering to deliver Tsundere Bot and XWorm malware. The actor impersonates trusted organizations and sends high-volume, targeted emails containing filtered links that lead victims to CAPTCHA-based landing pages designed to trick them into executing malicious PowerShell commands. The operation relies on layered redirection, infrastructure rotation, and IP filtering to evade detection, indicating a mature, scalable phishing operation focused on broad and sustained access generation. TA584 targets multiple industries including Healthcare, Government, Financial Services, Education, Business Services, Hospitals, Technology, Retail, Insurance, Construction, and Automotive across North America, Central America, the Caribbean, Europe, and Australia. The threat actor operates as an initial access broker, selling compromised network access to other cybercriminals, making this operation a critical enabler for downstream ransomware and data theft attacks.
TA584 is a well-established initial access broker active since late 2020. It runs large-scale phishing campaigns that rely on ClickFix social engineering to deliver Tsundere Bot and XWorm malware. The operation focuses on speed, volume, and user manipulation rather than exploit-based intrusion.
The attack begins with phishing emails sent from compromised legitimate accounts or trusted email platforms such as SendGrid and Amazon SES. These messages impersonate recognizable entities, including healthcare providers, government bodies, recruitment firms, and common business services. Each email contains a unique, victim-specific link that applies geofencing and IP filtering before allowing access to the next stage.
Victims who pass these checks are redirected to themed landing pages that display slide-based CAPTCHAs. Completing the CAPTCHA leads to a ClickFix prompt instructing the user to open the Windows Run dialog and execute a provided command. This step persuades the victim to manually launch a malicious PowerShell command, bypassing many security controls.
Once active, Tsundere Bot establishes persistent communication with its controller and profiles the system to generate a unique victim identifier. It collects basic hardware and operating system details and halts execution on systems configured for CIS-region languages, indicating deliberate targeting controls. Persistence is reinforced through an accompanying XWorm variant that hides registry run keys using null-byte obfuscation and launches hidden PowerShell activity at every reboot.
Campaigns range from thousands to nearly two hundred thousand messages, with targeting shifting by region and sector over time. TA584 has maintained consistent tradecraft for years while gradually expanding its reach. Recent activity suggests continued experimentation with payloads and a sustained effort to broaden victim coverage.
Enforce Group Policy restrictions to limit PowerShell access to approved roles only, materially reducing exposure to ClickFix-style social engineering and user-driven code execution.
Use application control policies such as AppLocker or Windows Defender Application Control to prevent execution of node.exe from non-standard, user-writable locations including AppData\Local directories.
Create detection rules for powershell.exe or cmd.exe spawning node.exe processes, particularly when Node.js is located in user profile directories or other non-standard locations.
Block or monitor outbound traffic to Ethereum RPC providers used by Tsundere Bot for C2 retrieval, preventing the malware from receiving command and control instructions via the blockchain.
Implement network monitoring to detect and inspect WebSocket connections to unknown or uncategorized domains, as Tsundere Bot uses WebSockets for C2 communication.
Deploy detection capabilities for registry modifications containing null-byte characters in key names, which are used by SharpHide for persistence evasion.
Segment networks to limit lateral movement capabilities if initial compromise occurs, particularly isolating systems that may process sensitive healthcare or financial data.
Initial Access
Execution
Persistence
Defense Evasion
Discovery
Command and Control
Resource Development
IP Addresses:
URL:
SHA256 Hashes:
Get through updates and upcoming events, and more directly in your inbox