BTC $71,807
2026 Bull Run Is Building Start trading with 5% OFF all fees
Sign Up Now
BTC $71,807
Bull Run 2026 | 5% Off Fees Open your Binance account today
Sign Up

TA585 Launches MonsterV2 Malware via Sophisticated Phishing Campaigns

TA585 Threat Actor Deploys MonsterV2 RAT via IRS-Themed Phishing Campaigns with Advanced Malware Capabilities

  • A previously unknown threat actor named TA585 distributes the Malware MonsterV2 through phishing campaigns.
  • MonsterV2 is a remote access trojan (RAT) and data stealer first seen advertised in February 2025.
  • Phishing efforts use fake IRS notices and manipulated websites to trick users into running malicious PowerShell commands.
  • The malware offers advanced features such as clipboard manipulation, hidden remote control, and download of additional payloads.
  • TA585 maintains its own infrastructure for delivery and avoids infecting systems in Commonwealth of Independent States (CIS) countries.

Cybersecurity researchers have identified a threat actor known as TA585 that uses phishing campaigns to deliver the malware MonsterV2. This activity was reported in October 2025 and involves phishing lures themed around the U.S. Internal Revenue Service (IRS) to convince victims to run harmful commands on their devices.

- Advertisement -

According to the Proofpoint Threat Research Team, TA585 operates its own entire attack chain including infrastructure and malware installation. MonsterV2 first appeared in cybercriminal forums in February 2025. It functions as a remote access trojan (RAT), a stealer (which extracts sensitive data), and a loader for other malicious software.

Phishing campaigns use fake IRS notices linking to PDF files that lead to web pages triggering the infection through a social engineering trick called ClickFix. This method involves users executing malicious commands in Windows Run or PowerShell, which then download and deploy MonsterV2. Later attacks used manipulated JavaScript injected into legitimate websites to display fake CAPTCHA verifications that initiate the malware’s delivery.

Before switching to MonsterV2, TA585 distributed the Lumma Stealer. The infrastructure involved has also been linked to distributing other stealers like Rhadamanthys. Some campaigns used fake GitHub security alerts to deliver links to attacker-controlled sites. These activities relate to a framework called CoreSecThree, active since 2022 and known to spread stealer malware.

MonsterV2 includes features such as copying cryptocurrency addresses from the clipboard and replacing them with attacker wallets, running hidden virtual network computing (HVNC) sessions for remote control, capturing screenshots, starting keyloggers, managing files, and executing commands sent from command-and-control (C2) servers. It also avoids infections within CIS countries.

- Advertisement -

The malware is sold by a Russian-speaking threat actor costing $800 monthly for a standard version and $2,000 for an enterprise edition that supports advanced features like loader functions and Chrome DevTools Protocol. MonsterV2 is packed with a C++ crypter called SonicCrypt that helps it avoid detection by performing anti-analysis and privilege escalation before connecting to its C2 server.

Once active, MonsterV2 sends system details including geolocation via a public IP lookup service. It follows instructions from its server to perform tasks including data theft, process control, HVNC connections, keylogging, system crashes, and deployment of additional payloads like StealC and Remcos RAT. The use of consistent infrastructure between MonsterV2 and StealC suggests coordination.

Proofpoint concluded that TA585 demonstrates advanced and unique capabilities, managing complex delivery and infection methods without relying on third parties, marking it as a significant presence in the evolving cybercrime landscape.

For more information, see the original Proofpoint report and related analysis by PRODAFT.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -
Ad
Altseason Is Loading. Don't watch from the sidelines.
SOL $90.51
DOGE $0.0963
LINK $9.02
SUI $1.00
5% off fees when you sign up
Start Trading
Ad
Pay Less on Every Trade. For Life.
$10K/mo volume Save $60/yr
$50K/mo volume Save $300/yr
$100K/mo volume Save $600/yr
5% off all trading fees when you sign up
Claim Your Discount

Latest News

New botnet targets Android TVs, IoT devices

A new Mirai-derived botnet called xlabs_v1 is targeting internet-exposed Android devices to build a...

Corning Stock Up 9% on $500M Nvidia Deal

Corning stock surged 9% to a record high after announcing a $500 million deal...

Bittrex Seeks $24M SEC Settlement Refund After Policy Shift

Defunct crypto exchange Bittrex is asking a federal judge to overturn its 2023 settlement...

Witkoff Backs Tether CEO’s ‘Trillions of Agents’ Crypto Future

World Liberty Financial is expanding rapidly into stablecoins and tokenized assets, positioning USD-backed stablecoins...

Strategy’s Saylor reverses stance, may sell Bitcoin for dividends

Michael Saylor's company, Strategy (formerly MicroStrategy), announced on its Q1 2026 earnings call that...

Must Read

What Are Sniper Bots Used in Defi Trading?

You've heard about DeFi, but what about sniper bots? These high-speed trading tools are shaking up the crypto scene.But don't fret, you're not...
Ad
Altseason Is Loading. These 4 coins are trending right now.
SOL $92.12
DOGE $0.0950
LINK $9.02
SUI $1.02
5% off spot fees when you sign up
Start Trading