APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia

Feb
28,
2023Ravie
LakshmananCyber
Threat
/
Malware

The
threat
actor
known
as

Blind
Eagle
has
been
linked
to
a
new
campaign
targeting
various
key
industries
in
Colombia.

APT-C-36 Strikes Again: Blind Eagle Hackers Target Key Industries in Colombia



Feb
28,
2023
Ravie
Lakshmanan
Cyber
Threat
/
Malware

The
threat
actor
known
as

Blind
Eagle

has
been
linked
to
a
new
campaign
targeting
various
key
industries
in
Colombia.

The
activity,
which
was
detected
by
the
BlackBerry
Research
and
Intelligence
Team
on
February
20,
2023,
is
also
said
to
encompass
Ecuador,
Chile,
and
Spain,
suggesting
a
slow
expansion
of
the
hacking
group’s
victimology
footprint.

Targeted
entities
include
health,
financial,
law
enforcement,
immigration,
and
an
agency
in
charge
of
peace
negotiation
in
Colombia,
the
Canadian
cybersecurity
company
said.

Blind
Eagle,
also
known
as

APT-C-36
,
was

recently
covered

by
Check
Point
Research,
detailing
the
adversary’s
advanced
toolset
comprising
Meterpreter
payloads
that
are
delivered
via
spear-phishing
emails.

The
latest
set
of
attacks
involves
the
group
impersonating
the
Colombian
government
tax
agency,
the
National
Directorate
of
Taxes
and
Customs
(DIAN),
to
phish
its
targets
using
lures
that
urge
recipients
to
settle
“outstanding
obligations.”

The
craftily
designed
email
messages
come
with
a
link
pointing
to
a
PDF
file
that’s
purportedly
hosted
on
DIAN’s
website,
but
actually
deploys
malware
on
the
targeted
system,
effectively
launching
the
infection
chain.

“The
fake
DIAN
website
page
contains
a
button
that
encourages
the
victim
to
download
a
PDF
to
view
what
the
site
claims
to
be
pending
tax
invoices,”
BlackBerry
researchers

said
.

“Clicking
the
blue
button
initiates
the
download
of
a
malicious
file
from
the
Discord
content
delivery
network
(CDN),
which
the
attackers
are
abusing
in
this
phishing
scam.”

The
payload
is
an
obfuscated
Visual
Basic
Script
(VBS),
which
gets
executed
upon
opening
the
“PDF”
file
and
utilizes
PowerShell
to
retrieve
a
.NET-based
DLL
file
that
ultimately
loads
AsyncRAT
into
memory.

“A
malicious
[remote
access
trojan]
installed
on
a
victim’s
machine
enables
the
threat
actor
to
connect
to
the
infected
endpoint
any
time
they
like,
and
to
perform
any
operations
they
desire,”
the
researchers
said.

Also
of
note
is
the
threat
actor’s
use
of

dynamic
DNS

services
like
DuckDNS
to
remotely
commandeer
the
compromised
hosts.

Blind
Eagle
is
suspected
to
be
a
Spanish-speaking
group
owing
to
the
use
of
the
language
in
its
spear-phishing
emails.
However,
it’s
currently
unclear
where
the
threat
actor
is
based
and
whether
their
attacks
are
motivated
by
espionage
or
financial
gain.

“The
modus
operandi
used
has
mostly
stayed
the
same
as
the
group’s
previous
efforts

it
is
very
simple,
which
may
mean
that
this
group
is
comfortable
with
its
way
of
launching
campaigns
via
phishing
emails,
and
feels
confident
in
using
them
because
they
continue
to
work,”
BlackBerry
said.

Found
this
article
interesting?
Follow
us
on

Twitter


and

LinkedIn

to
read
more
exclusive
content
we
post.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.