In a recent detailed investigation by Trustwave SpiderLabs, the threat group Blind Eagle (APT-C-36) has been linked with the Russian bulletproof hosting provider Proton66.
This group has been actively targeting Latin American organizations, with a pronounced focus on Colombian financial institutions, including Bancolombia, BBVA, Banco Caja Social, and Davivienda.
The analysis sheds light on how Blind Eagle leverages open-source Remote Access Trojans (RATs), Visual Basic Script (VBS) loaders, and simple yet effective obfuscation techniques to bypass static malware detection.
Blind Eagle’s operations pivot around infrastructure hosted on Proton66-associated IP addresses, notably the IP 45.135.232[.]38.
The group extensively uses free Dynamic DNS (DDNS) services, particularly DuckDNS, to register domains with consistent naming patterns starting from August 2024.
These domains host phishing pages that mimic legitimate Colombian bank portals and VBS scripts, serving as the initial infection vector.
The VBS files are obfuscated using a subscription-based tool called Vbs-Crypter, advertised on Telegram channels such as “Crypters and Tools.”
This crypter complicates static detection by packing and encrypting the scripts. The VBS loaders perform several critical actions:
C:\ drive, reducing the chance of detection.Software\Classes), CLSID entries, and WOW6432Node paths to erase forensic traces.schtasks /create /tn coJb /tr "%TEMP%\GLPd.vbs" /sc minute /mo 1) to maintain persistence on infected machines.After these initial steps, the VBS scripts decode embedded Base64 strings and execute PowerShell commands to download second-stage payloads from public paste sites like paste.ee, textbin.net, and file hosting services such as gofile.io.
The second-stage payloads are typically commodity RATs, primarily AsyncRAT and Remcos, disguised as DLL files with .txt extensions. These RATs establish command and control (C2) connections to publicly accessible management panels.
One notable discovery was a botnet panel with a Brazilian Portuguese interface, managing over 260 infected hosts, primarily located in Argentina. The panel provides operators with comprehensive control capabilities, including:
Interestingly, the threat actors show minimal operational security (OpSec). Their infrastructure hosts open directories containing identical malicious files, phishing kits, and VBS loaders.
The phishing pages replicate bank login portals almost perfectly, aiming to harvest user credentials.
Blind Eagle’s campaign exemplifies how relatively unsophisticated infrastructure and publicly available tools can still inflict significant damage, especially when combined with region-specific phishing lures.
The attackers prioritize rapid deployment and accessibility over stealth or infrastructure concealment, making detection possible but requiring vigilance.
Organizations in Latin America, particularly financial institutions, should adopt the following measures:
*.duckdns.org)paste.ee, textbin.net, gofile.iocoJbBlind Eagle’s campaign is a stark reminder that even low-complexity threat actors can leverage open-source tools and basic obfuscation to evade detection and compromise high-value targets.
Vigilance, combined with layered defenses and regional threat intelligence, remains crucial in countering such evolving threats.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…