| SYMBOL | COMMON_NAME | aka. SYNONYMS |
TA829 is a Russia-aligned threat actor that employs the RomCom RAT for intelligence-gathering and financially motivated cyberattacks, exploiting zero-day vulnerabilities in Mozilla Firefox and Microsoft Windows. The group utilizes REM Proxy services hosted on compromised MikroTik routers to relay traffic and disguise its origin. In their operations, victims targeted by TA829 receive a strain known as SlipScreen, while their infrastructure and tactics show significant similarities to those of UNK_GreenSec. TA829's hybrid approach combines espionage with financial fraud, making it a notable player in the cyber threat landscape.
There are currently no families associated with this actor.
| 2025-06-30
⋅
Proofpoint
⋅
10 Things I Hate About Attribution: RomCom vs. TransferLoader MeltingClaw RustyClaw ShadyHammock SlipScreen TransferLoader TA829 |