Skip to content

Cyber Security And Bitcoin Blockchain News

The World

  • Report Investigates a Secret, Invitation-Only Crypto Event Held in Beverly Hills – Bitcoin News bitcoin news
  • Uncovering Terra’s Implosion — Terraform Labs’ Big Name Backers and ‘Zero Exposure’ Claims – Bitcoin News bitcoin news
  • SHIELDS UP in bite sized chunks cyber security news
  • Pakistan Forms Committees to Decide Whether Crypto Should Be Legalized or Banned – Regulation Bitcoin News bitcoin news
  • Nigerian CBDC Wallet Update to Enable Utility Payments, USSD Functionality to Be Added – Featured Bitcoin News bitcoin news
  • Mangata Finance’s Polkadot-based Efficient, MEV-Free DEX Coming June 6th bitcoin news
  • KICK․IO Is Evolving – Taking a Closer Look Into the Roadmap – Press release Bitcoin News bitcoin news
  • Electrifying Live Casino Game XXXtreme Lightning Roulette in Exclusive Early Access – Promoted Bitcoin News bitcoin news

Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia

Posted on May 11, 2022 By root


An espionage-focused threat actor known for targeting China, Pakistan, and Saudi Arabia has expanded to set its sights on Bangladeshi government organizations as part of an ongoing campaign that commenced in August 2021.

Cybersecurity firm Cisco Talos attributed the activity with moderate confidence to a hacking group dubbed the Bitter APT based on overlaps in the command-and-control (C2) infrastructure with that of prior campaigns mounted by the same actor.

“Bangladesh fits the profile we have defined for this threat actor, previously targeting Southeast Asian countries including China, Pakistan, and Saudi Arabia,” Vitor Ventura, lead security researcher at Cisco Talos, told The Hacker News.

“And now, in this latest campaign, they have widened their reach to Bangladesh. Any new country in southeast Asia being targeted by Bitter APT shouldn’t be of surprise.”

Bitter (aka APT-C-08 or T-APT-17) is suspected to be a South Asian hacking group motivated primarily by intelligence gathering, an operation that’s facilitated by means of malware such as BitterRAT, ArtraDownloader, and AndroRAT. Prominent targets include the energy, engineering, and government sectors.

The earliest attacks were distributing the mobile version of BitterRAT date back to September 2014, with the actor having a history of leveraging zero-day flaws — CVE-2021-1732 and CVE-2021-28310 — to its advantage and accomplish its adversarial objectives.

The latest campaign, targeting an elite entity of the Bangladesh government, involves sending spear-phishing emails to high-ranking officers of the Rapid Action Battalion Unit of the Bangladesh police (RAB).

As is typically observed in other social engineering attacks of this kind, the missives are designed to lure the recipients into opening a weaponized RTF document or a Microsoft Excel spreadsheet that exploits previously known flaws in the software to deploy a new trojan; dubbed “ZxxZ.”

ZxxZ, named so after a separator used by the malware when sending information back to the C2 server, is a 32-bit Windows executable compiled in Visual C++.

“The trojan masquerades as a Windows Security update service and allows the

malicious actor to perform remote code execution, allowing the attacker to perform any other activities by installing other tools,” the researchers explained.

While the malicious RTF document exploits a memory corruption vulnerability in Microsoft Office’s Equation Editor (CVE-2017-11882), the Excel file abuses two remote code execution flaws, CVE-2018-0798 and CVE-2018-0802, to activate the infection sequence.

“Actors often change their tools to avoid detection or attribution, this is part of the lifecycle of a threat actor showing its capability and determination,” Ventura said.





TheHackersNews/

cyber security news

Post navigation

Previous Post: ETH Bounces Back, up 2%, While BTC Climbs Above $30,000 – Market Updates Bitcoin News
Next Post: What You Need to Know to Stay Resilient

Related Posts

  • U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities cyber security news
  • The Importance of Defining Secure Code cyber security news
  • Malicious NPM Packages Target German Companies in Supply Chain Attack cyber security news
  • Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability cyber security news
  • SIM-based Authentication Aims to Transform Device Binding Security to End Phishing cyber security news
  • New Saitama backdoor Targeted Official from Jordan’s Foreign Ministry cyber security news

Archives

  • May 2022

Categories

  • bitcoin news
  • cyber security news

Recent Posts

  • How Ethereum Uniswap Reached A Milestone Of $1T In Trading Volume
  • Russian Court Recognizes Cryptocurrency as Means of Payment, Prosecutors See Precedent – Regulation Bitcoin News
  • Bitcoin, Ethereum Exchange Inflows Suggest Sell-Offs Are Far From Over
  • SOL, NEAR Fall Over 10% During Tuesday’s Session – Market Updates Bitcoin News
  • Popular PyPI Package ‘ctx’ and PHP Library ‘phpass’ Hijacked to Steal AWS Keys

Recent Comments

No comments to show.
  • SWIFT Is Experimenting With Decentralized Technologies to Allow CBDC Interconnection – Bitcoin News bitcoin news
  • BTC Back Above $30,000 as Week Long Consolidation Continues – Market Updates Bitcoin News bitcoin news
  • Majority of Russia’s Financial Pyramids in Q1 Linked to Crypto, Scammers Exploit Sanctions Topic – Bitcoin News bitcoin news
  • GameFi Project ArchLoot Provides NFT User Builder for Creative Playability – Press release Bitcoin News bitcoin news
  • BRICS Countries Told to Consider Countering the Dollar’s Global Hegemony – Economics Bitcoin News bitcoin news
  • A16z Launches $600 Million Web3 Gaming Focused Fund – Bitcoin News bitcoin news
  • Crypto Shorts See $240M Flush As Bitcoin Rebounds Back Above $30k bitcoin news
  • ETC Climbs to 1-Week High, as AXS Moves Away From 10-Month Low – Market Updates Bitcoin News bitcoin news

Copyright © 2022 Cyber Security And Bitcoin Blockchain News.

Powered by PressBook News Dark theme