An actor specialized in selling initial network access, known by analysts as TA584, has reincreased the level of its activity and does so by combining new tools that increase the risk that an intrusion will end up in a ransomware attack. This campaign, documented by Proofpoint researchers, exhibits a chain of commitment carefully designed to avoid static detections and convert legitimate accounts committed into entry doors to corporate infrastructure.
The most striking piece in this puzzle is the incorporation of Tsundere Bot, a malware platform as a service that operates over Node.js and that was described by Kaspersky Last year. Tsundere does not only act as a back door and charger; it also uses an unconventional technique to get the address of its control server: it extracts information from the Etherium blockchain (a variation of what some researchers called "concealing" techniques in block chains). This flexibility and sophistication fits the role that TA584 plays in the cybercrime ecosystem: providing valuable access that other extortion groups can use.

According to Proofpoint's report, the current operation is part of hundreds of old accounts already committed that are used to send malicious emails through legitimate mass shipping services, such as SendGrid or Amazon Simple Email Service. The following is not a simple attachment or a generic link: each recipient receives a single URL and the infrastructure filters traffic by geographical location and IP; in addition, redirection chains are used that often pass through third-party traffic management systems ("TDS") such as Keitaro. The aim is for only specific victims to reach the next step.
If the visitor passes the filters, he first finds a CAPTCHA and then a page that appears to be a repair service (known as ClickFix in the analyses). That page urges you to run a PowerShell command: by doing so, the machine downloads and runs an osfuscated script in memory that it loads, without leaving obvious files on disk, either XWorm - a known remote access Trojan - or Tsundere Bot. After the execution, the browser is redirected to a safe site to disguise the intrusion. This mode of operation reduces the surface that security tools review and complicates signature-based detection.
TA584's trajectory is not static: Proofpoint has observed this actor using a wide variety of malware families over the years, from infostealers like Ursnif to post-exploitation frameworks like Cobalt Strike. The volume of campaigns reported increased by the end of 2025 over the first quarter, and the geography of the targets expanded beyond North America and the UK / Ireland, reaching Germany, other European countries and Australia. This expansion suggests a clear intention to diversify markets and monetize access in multiple regions.
Tsundere Bot, for its part, incorporates features that make it especially attractive for operators seeking persistence and lateral exploration: it collects system information to profile potential victims, can run arbitrary JavaScript code sent by its command center, allows to use committed machines such as SOCKS proxies and even has an internal market where "bots" can be bought and sold. In addition, the installer includes an alternate control address encoded as backup in case the recovery from the block chain fails and avoids being implemented in systems configured with typical languages of the Commonwealth of Independent States, which points to a deliberate effort to target operators or victims of the CIS region.
All this explains why Proofpoint researchers consider that Tsundere Bot infections, when they are part of TA584 operations, have a high potential to lead to ransomware incidents. In practice, the initial access sale makes it easier for other more specialized groups - so-called Ransomware operators - to rent or buy already authenticated input and only have to deploy their encryption or exfiltration load to maximize the damage.

For security organizations and professionals, the lesson is twofold: it is not enough to rely on the validation of sender or basic mail controls; it is also necessary to monitor more subtle patterns, such as the use of legitimate shipping suppliers, unique URLs per recipient, redirection chains and loads that are executed exclusively in memory. The best practice guides to ransomware and initial access recommend strengthening authentication, segregating privileges, monitoring processes in memory and educating employees not to run commands that ask them for unreliable web pages. Official resources such as the U.S. agency CISA collect measures and recommendations that can help to harden defenses: CISA - Ransomware Information.
In an ecosystem where access vendors and malware platforms as service are professionalized, prevention requires combining policies, technology and training. Offensive innovation does not stop and defenders cannot do it either.: monitor engagement chains, update rules to detect living-off-the-land techniques (such as PowerShell abuse) and analyze memory behaviors are measures that today make the difference between a frustrated attempt and a cost-effective intrusion for attackers.
If you want to deepen the technical findings and examples of the attack chain, the Proofpoint report is a detailed and recommended reading for its view on TA584 and the tactics observed: Proofpoint - TA584 analysis. To understand the technical component of Tsundere Bot and its use of the blockchain as a resilience vector, the Kaspersky report provides valuable context: Kaspersky - Tsundere Bot.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

RAMPART and Clarity redefine the safety of IA agents with reproducible testing and governance from the start
Microsoft has presented two open source tools, RAMPART and Clarity, aimed at changing the way the safety of IA agents is tested: one that automates and standardizes technical te...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

WebWorm 2025: the malware that is hidden in Discord and Microsoft Graphh to evade detection
The latest observations by cyber security researchers point to a change in worrying tactics of an actor linked to China known as WebWorm: in 2025 it has incorporated back doors ...

Identity is no longer enough: continuous verification of the device for real-time security
Identity remains the backbone of many security architectures, but today that column is cracking under new pressures: advanced phishing, real-time proxyan authentication kits and...

The dark matter of identity is changing the rules of corporate security
The Identity Gap: Snapshot 2026 report published by Orchid Security puts numbers to a dangerous trend: the "dark matter" of identity - accounts and credentials that are neither ...