Blind Eagle Hackers Return with Refined Tools and Sophisticated Infection Chain

Jan 05, 2023Ravie LakshmananCyber Attack / Malware

A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part of its attacks targeting organizations in Colombia and Ecuador.

Check Point’s latest research offers new insights into the Spanish-speaking group’s tactics and techniques, including the use of sophisticated tools and government-themed lures to activate the killchain.

Also tracked under the name APT-C-36, Blind Eagle is notable for its narrow geographical focus and launching indiscriminate attacks against South American nations since at least 2018.

Blind Eagle’s operations have been documented by Trend Micro in September 2021, uncovering a spear-phishing campaign primarily aimed at Colombian entities designed to deliver a commodity malware known as BitRAT, with a lesser focus towards targets in Ecuador, Spain, and Panama.

Attacks chains commence with phishing emails containing a booby-trapped link that, when clicked, leads to the deployment of an open source trojan named Quasar RAT with the ultimate goal of gaining access to the victim’s bank accounts.

Some of targeted banks consists of Banco AV Villas, Banco Caja Social, Banco de Bogotá, Banco Popular, Bancoomeva, BBVA, Colpatria, Davivienda, and TransUnion.

Blind Eagle Hackers

Should the email recipient be located outside of Colombia, the attack sequence is aborted and the victim is redirected to the official website of the Colombian border control agency, Migración Colombia.

A related campaign singling out both Colombia and Ecuador masquerades as the latter’s Internal Revenue Service (SRI) and makes use of a similar geo-blocking technology to filter out requests originating from other countries.

This attack, rather than dropping a RAT malware, employs a more complex multi-stage process that abuses the legitimate mshta.exe binary to execute VBScript embedded inside an HTML file to ultimately download two Python scripts.

The first of the two,, is an in-memory loader engineered to run a Meterpreter payload in DLL format. is also a Meterpreter artifact, only it’s programmed in Python, indicating that the threat actor could be using one of them as a redundant method to retain backdoor access to the host.

“Blind Eagle is a strange bird among APT groups,” the researchers concluded. “Judging by its toolset and usual operations, it is clearly more interested in cybercrime and monetary gain than in espionage.”

The development comes days after Qualys disclosed that an unknown adversary is leveraging personal information stolen from a Colombian cooperative bank to craft phishing emails that result in the deployment of BitRAT.

Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post.
Cyber Security

Articles You May Like

Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
Elon Musk Says Twitter Has 2,300 Active Employees, Refutes Report of 75 Percent on Workers Being on Leave
Google Pixel 7 Supposedly Getting Dual eSIM Support With Android 13 Beta Update: Report
Google employees scramble for answers after layoffs hit long-tenured and recently promoted employees
Twitter is down to fewer than 550 full-time engineers

Leave a Reply

Your email address will not be published. Required fields are marked *