Cybercriminals Use TAG-124 Infrastructure to Spread Malicious Payloads

A growing trend in the cybercriminal ecosystem is the adoption of sophisticated Traffic Distribution Systems (TDSs) to orchestrate targeted attacks against US consumers and organizations.

Originally designed for legitimate digital advertising, these systems collect and analyze browser data, geolocation, and behavioral indicators to efficiently direct users to highly relevant ads.

Now, however, threat actors have weaponized TDS technology to deliver custom-tailored malware to victims most likely to engage with malicious content while sidestepping security researchers and automated analysis environments, thereby maximizing compromise rates and minimizing detection.

Cyberattackers Fuel Targeted Ransomware Campaigns with Malicious TDS Networks

Insikt Group, a threat intelligence division, has spotlighted the role of a particularly prolific malicious TDS identified as TAG-124.

This system functions as a shared infrastructure for multiple cybercrime syndicates, providing ransomware operators and other threat actors the tools to streamline the delivery of ransomware and infostealers to high-value targets.

TAG-124’s influence is evident in recent ransomware attacks on the healthcare sector, amplifying the risk for organizations with sensitive data and critical operations.

Prominent groups exploiting TAG-124 include Rhysida and Interlock two ransomware operations notorious for their “big game hunting” strategies.

Malicious Payloads
 Multiple threat actors use TAG-124 to direct victims to their malware

These actors select victims within healthcare and key infrastructure sectors, aiming for organizations with heightened urgency to restore operations and, therefore, greater willingness to pay ransoms.

For instance, Rhysida’s 2023 breach of Prospect Medical Holdings compromised over half a million social security numbers, severely impacting healthcare service delivery.

Similarly, Interlock’s December 2024 attack on Texas Tech University Health Sciences Center led to the theft of 2.6 terabytes of sensitive information.

While both groups exhibit comparable tactics and attack patterns, their precise relationship remains unconfirmed.

Escalating Risk for Healthcare and Critical Infrastructure Sectors

TAG-124 also supports other malicious entities such as TA866 (Asylum Ambuscade), a group connected to financially motivated campaigns and espionage operations likely on behalf of Russian state interests.

The infrastructure’s use of SEO poisoning and the compromise of legitimate websites significantly broadens its attack surface, funneling unsuspecting users and organizations into ransomware and data theft schemes.

By outsourcing the infection stage to TAG-124, threat actors can focus on more aggressive lateral movement and extortion tactics in later phases of the attack chain.

The cyclical nature of ransomware profits where successful attacks fund enhanced cybercriminal capabilities means that advanced services like TAG-124 will continue to evolve.

The collaboration between crimeware operators and state-linked actors signals a shift toward more organized and opportunistic threats, making early detection and mitigation increasingly critical.

Missed intrusions at this early TDS-driven stage can be costly, as highlighted by Sunflower Medical’s ongoing legal fallout after a breach reportedly undetected for three weeks, underscoring the stakes for defenders.

Responding to this threat, experts recommend a multi-layered approach to detection and prevention.

Beyond blocking known malicious indicators, organizations are urged to implement robust host- and network-based detection mechanisms, leveraging frameworks like YARA, Snort, and Sigma for proactive file and activity analysis.

According to the Report, User education remains essential, especially to counteract SEO poisoning and social engineering trends, such as deceptive browser update prompts.

Regular browser updates and security settings, including pop-up blocking, are advised as part of a layered defense.

TAG-124 is not alone in the TDS landscape, with competitors like VexTrio, Prometheus TDS, and BlackTDS also facilitating malware campaigns on an industrial scale.

As these platforms continue to underpin both criminal and occasional state-sponsored operations, understanding and disrupting TDS-enabled infrastructure becomes a vital strategy in the ongoing effort to preempt high-impact cyberattacks.

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here