Skip to main content
  1. Home
  2. Computing
  3. Business
  4. Web
  5. News

Hackers attacking corporate executive targets with personalized phishing emails

Add as a preferred source on Google

Security firm Proofpoint reports that a “financially motivated threat actor” it calls TA530 is currently targeting company executives and additional high-level employees in an unusually personalized spear phishing campaign. It’s targeting individuals with high-ranking roles such as chief financial officer and senior vice president using emails containing their specific names, job titles, phone numbers, and more within the email body.

A spear phishing campaign doesn’t send out emails to a general audience hoping to reel in a few victims, but typically focuses on a specific organization in order to hook individuals into giving up confidential information such as military data or trade secrets. The emails appear to derive from a trusted source, and contain a link to a fake malware-infested Web page or a file that downloads malicious software.

Recommended Videos

Proofpoint says the information used by TA530 can be gathered from public sites like the company’s own website, LinkedIn, and so on. It’s targeting up to tens of thousands of individuals located in organizations based in the United States, the United Kingdom, and Australia. The attacks are even larger than other spear phishing campaigns, but have yet to approach the magnitude of Dridex and Locky.

TA530 is mostly targeting financial services, followed by organizations in retail, manufacturing, health care, education, and business services. Technology-focused organizations are also affected along with insurance companies, utility services, and companies involved in entertainment and media. Transportation is the lowest on the list of targets.

TA530 carries a number of playloads in its arsenal, including a banking Trojan, a Point of Sale reconnaissance Trojan, a downloader, file-encrypting ransomware, a banking Trojan botnet, and more. For instance, the Point of Sale reconnaissance Trojan is mostly used in a campaign against retail and hospitality companies, and financial services. The banking Trojan is configured to attack banks located throughout Australia.

In a sample email provided in the report, Proofpoint shows that TA530 is attempting to infect the manager of a retail company. This email includes the target’s name, the company name, and the phone number. The message requests that the manager fill out a report regarding an incident that took place at one of the actual retail locations. The manager is to open the document, and if macros are enabled, it will infect his computer by downloading the Point of Sale Trojan.

In the few cases presented by Proofpoint, the targeted individuals receive an infected document although the security firm states that these emails can also contain malicious links and attached JavaScript downloaders. The company has also seen a few emails in the TA530-based campaigns that were not personalized, but still carried the same consequences.

“Based on what we have seen in these examples from TA530, we expect this actor to continue to use personalization and to diversify payloads and delivery methods,” the firm states. “The diversity and nature of the payloads suggest that TA530 is delivering payloads on behalf of other actors. The personalization of email messages is not new, but this actor seems to have incorporated and automated a high level of personalization, previously not seen at this scale, in their spam campaigns.”

Unfortunately, Proofpoint believes that this personalization technique isn’t limited to TA530, but will ultimately be used by hackers as they learn to pull corporate information from public websites such as LinkedIn. The answer to this problem, according to Proofpoint, is end-user education and a secure email gateway.

Kevin Parrish
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
Google just gave Workspace a 24/7 AI agent that sends emails and books meetings while you sleep
Google announcing five Workspace features at once is either confidence or chaos, but Gemini Spark acting on your behalf while you sleep is the one that actually changes what a productivity suite is supposed to do.
Google AI Inbox for Gmail users.

At the I/O 2026, Google announced several AI-powered updates for its Workspace apps. The main highlight of the announcement is Gemini Spark, a 24/7 personal AI agent that doesn’t just answer questions but takes actions on your behalf. 

It can send emails, add calendar events, and complete tasks across Workspace apps. And before you even ask, it asks before doing a high-stakes task, and you can choose whether you want to enable it or not. It's coming soon in preview for Workspace business customers in the Gemini app.

Read more
Gemini can now make videos, brief your morning, and do digital chores while you sleep
Gemini is now an AI intern that never logs off
Google Gemini App gets a major update

Google is giving the Gemini app a massive update, bringing a bunch of nifty changes. The chatbot phase is fading, and the company now wants Gemini to become something closer to a full-time digital assistant.

During Google I/O 2026, the company announced a redesigned Gemini app along with a new model, proactive daily summaries, video tools, and a 24/7 agent called Gemini Spark. Google claims that Gemini has now reached more than 900 million monthly users across 230 countries and more than 70 languages, up from 400 million last year.

Read more
Google Search is getting AI agents that will monitor the web for you
Set up an agent once, and Search will notify you when it finds what you're looking for.
Google Search information agents featured

Google used its I/O 2026 keynote to announce a major overhaul of Search, introducing AI agents, a redesigned search box, and agentic coding capabilities that can generate custom apps and dashboards on the fly.

A new search box

Read more