Hackers Exploit Password-Protected Zip Archives for Malicious Campaigns: TA571 Spreads Forked IcedID Variant and Puts Over 1,200 Global Clients at Risk

In today’s digital landscape, hackers are constantly devising new methods to distribute malware while evading detection by security software. One such technique involves the use of password-protected Zip Archive files. These files serve as a guise for hackers to deploy malware and carry out malicious campaigns. Recent discoveries by cybersecurity researchers at Proofpoint have shed light on the activities of the notorious threat group known as TA571. Their findings showcase the spread of the Forked IcedID variant and the significant impact it has had on over 1,200 clients across various sectors.

Discovery of malicious campaigns by TA571

During two significant dates in October 2023, Proofpoint’s cybersecurity researchers made a startling revelation regarding the activities of TA571. They uncovered two malicious campaigns masterminded by this threat group, both of which involved the distribution of the Forked IcedID variant. This particular variant has become increasingly prevalent in recent times and poses a significant threat to the security landscape.

Impact on global clients

The consequences of TA571’s malicious campaigns have been far-reaching, with over 1,200 clients worldwide falling victim. Shockingly, these clients were subjected to over 6,000 messages carrying malware-laden payloads. The reach of these campaigns has extended across diverse sectors, affecting businesses, organizations, and individuals alike. The sheer scale of the impact underscores the urgent need for robust cybersecurity measures.

Concern regarding the danger of ransomware attacks and its impact on user confidence

Proofpoint’s security experts have expressed a high level of confidence in the ransomware danger posed by TA571 infections. This threat group has earned notoriety as a prolific spam distributor known for sending out emails embedded with malware. This reputation only amplifies the concern surrounding their activities, as it indicates the potential for widescale ransomware attacks that can cripple entire networks.

Thread hijacking and 404 TDS URLs

A key element in TA571’s malicious campaigns is the utilization of thread hijacking techniques. By adopting this strategy, they can deceive recipients by disguising their emails as legitimate threads. To further complicate matters, these campaigns leverage 404 TDS URLs for malware delivery. Since September 2022, researchers have been diligently tracking the use of these URLs by TA571, revealing an evolving and sophisticated methodology.

The zip archive with a VBS script

Central to TA571’s malicious campaigns is the deployment of password-protected Zip Archive files. These archives contain a malicious payload in the form of a VBS script running an IcedID Forked loader. This cleverly disguised method serves as an entry point for the malware, enabling TA571 to gain unauthorized access and execute their nefarious activities undetected.

Discovery of the Forked IcedID Variant

February 2023 marked a significant breakthrough for Proofpoint’s cybersecurity analysts, as they successfully identified and discovered the Forked IcedID variant. This variant, employed by TA571 in their malicious campaigns, introduced increased complexities to the cybersecurity landscape. Identification and understanding of this variant have enabled researchers to develop countermeasures and enhance defenses against TA571’s activities.

Unusual Delivery and Sophistication of TA571

One striking aspect of TA571’s operations is its unconventional delivery methods. The deployment of the Forked IcedID variant is atypical and has caught the attention of cybersecurity researchers. This observation leads to the recognition of TA571 as a highly sophisticated threat actor that employs intermediary “gates” for precise targeting and evading sandboxes. Their ability to adapt and elude detection further emphasizes the need for advanced security measures.

The discovery of TA571’s malicious campaigns employing password-protected Zip Archive files for malware distribution has raised significant concerns within the cybersecurity community. The spread of the Forked IcedID variant, coupled with the impact on over 1,200 clients across various sectors, showcases the immense danger posed by this threat group. Proofpoint’s security experts highlight the urgent need for heightened vigilance and robust cybersecurity measures to combat this ever-evolving threat. As the battle against hackers intensifies, organizations and individuals must remain proactive in implementing strong defenses to safeguard their digital assets and operations.

Explore more

Raedbots Launches Egypt’s First Homegrown Industrial Robots

The metallic clang of traditional assembly lines is finally being replaced by the precise, rhythmic hum of domestic innovation as Raedbots unveils a suite of industrial machines that redefine local manufacturing. For decades, the Egyptian industrial sector remained shackled to the high costs of European and Asian imports, making the dream of a fully automated factory floor an expensive luxury

Trend Analysis: Sustainable E-Commerce Packaging Regulations

The ubiquitous sight of a tiny electronic component rattling inside a massive cardboard box is rapidly becoming a relic of the past as global regulators target the hidden environmental costs of e-commerce logistics. For years, the digital retail sector operated under a “speed at any cost” mentality, often prioritizing packing convenience over spatial efficiency. However, as of 2026, the legislative

How Are AI Chatbots Reshaping the Future of E-commerce?

The modern digital marketplace operates at a velocity where a three-second delay in response time can result in a permanent loss of consumer interest and substantial revenue. While traditional storefronts relied on human intuition to guide shoppers through aisles, the current e-commerce landscape uses sophisticated artificial intelligence to simulate and surpass that personalized touch across millions of simultaneous interactions. This

Stop Strategic Whiplash Through Consistent Leadership

Every time a leadership team decides to pivot without a clear explanation or warning, a shockwave travels through the entire organizational chart, leaving the workforce disoriented, frustrated, and increasingly cynical about the future. This phenomenon, frequently described as strategic whiplash, transforms the excitement of a new executive direction into a heavy burden of wasted effort for the staff. Instead of

Most Employees Learn AI by Osmosis as Training Lags

Corporate boardrooms across the country are echoing with the same relentless command to integrate artificial intelligence immediately, yet the vast majority of people expected to use these tools have never received a single hour of formal instruction. While two-thirds of organizations now demand AI implementation as a standard operating procedure, the workforce has been left to navigate this technological frontier