Blind Eagle Hackers Return with Refined Instruments and Refined An infection Chain

Deal Score0
Deal Score0

Jan 05, 2023Ravie LakshmananCyber Assault / Malware

A financially motivated risk actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate an infection chain as a part of its assaults concentrating on organizations in Colombia and Ecuador.

Test Level’s latest research affords new insights into the Spanish-speaking group’s techniques and methods, together with the usage of subtle instruments and government-themed lures to activate the killchain.

Additionally tracked underneath the identify APT-C-36, Blind Eagle is notable for its slender geographical focus and launching indiscriminate assaults in opposition to South American nations since no less than 2018.

Blind Eagle’s operations have been documented by Development Micro in September 2021, uncovering a spear-phishing marketing campaign primarily geared toward Colombian entities designed to ship a commodity malware referred to as BitRAT, with a lesser focus in direction of targets in Ecuador, Spain, and Panama.

Assaults chains begin with phishing emails containing a booby-trapped hyperlink that, when clicked, results in the deployment of an open supply trojan named Quasar RAT with the final word objective of having access to the sufferer’s financial institution accounts.

A few of focused banks consists of Banco AV Villas, Banco Caja Social, Banco de Bogotá, Banco Well-liked, Bancoomeva, BBVA, Colpatria, Davivienda, and TransUnion.

Blind Eagle Hackers

Ought to the e-mail recipient be situated outdoors of Colombia, the assault sequence is aborted and the sufferer is redirected to the official web site of the Colombian border management company, Migración Colombia.

A associated marketing campaign singling out each Colombia and Ecuador masquerades because the latter’s Inner Income Service (SRI) and makes use of the same geo-blocking expertise to filter out requests originating from different international locations.

This assault, moderately than dropping a RAT malware, employs a extra complicated multi-stage course of that abuses the legit mshta.exe binary to execute VBScript embedded inside an HTML file to finally obtain two Python scripts.

The primary of the 2,, is an in-memory loader engineered to run a Meterpreter payload in DLL format. can be a Meterpreter artifact, solely it is programmed in Python, indicating that the risk actor could possibly be utilizing certainly one of them as a redundant technique to retain backdoor entry to the host.

“Blind Eagle is a wierd chicken amongst APT teams,” the researchers concluded. “Judging by its toolset and standard operations, it’s clearly extra fascinated about cybercrime and financial achieve than in espionage.”

The event comes days after Qualys disclosed that an unknown adversary is leveraging private info stolen from a Colombian cooperative financial institution to craft phishing emails that outcome within the deployment of BitRAT.

Discovered this text attention-grabbing? Observe us on Twitter and LinkedIn to learn extra unique content material we submit.

We will be happy to hear your thoughts

Leave a reply
Enable registration in settings - general