Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Colombian Blind Eagle Hacks facilities using NTLM deficiencies, rats and attacks based on GitHub
Global Security

Colombian Blind Eagle Hacks facilities using NTLM deficiencies, rats and attacks based on GitHub

AdminBy AdminMarch 11, 2025No Comments3 Mins Read
GitHub-Based Attacks
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Attacks based on GitHub

Actor threats known as Room Since November 2024, he has been connected with a number of current companies aimed at Colombian institutions and state structures.

“Monitoring companies are oriented – Note In a new analysis.

“More than 1,600 victims were injured during one of these companies, which took place approximately December 19, 2024. This infection level is significant, given the purposeful approach to APT.”

The room, active with at least 2018, is also monitored as Aguilaciega, Apt-C-36 and Apt-Q-98. It know For its hyper-specific targets for legal entities in South America, in particular Colombia and Ecuador.

Cybersecurity

The attacks of the attacks organized by the actor threatens entails the use of social engineering tactics, often in the form of e -mail spear to gain initial access to target systems and ultimately abandon easily available Trojans such as Asyncrat, NJRAT, QUASAR RAT and REMCOS RAT.

The latest set of invasion is characteristic for three reasons: Use operation option for now requested Microsoft Windows Link (Cve-2024-43451( Heartageand distribution of useful loads through Bitbucket and GitHub, going beyond Google Drive and Dropbox.

Specifically, Heartcrypt is used to protect malicious performance, option Purecrypter This is then responsible for launching malicious Remcos rats located on a changed Bitbucket or GitHub Repository.

The CVE-2024-43451 refers to the vulnerability of the NTLMV2 Hash, which was recorded by Microsoft in November 2024. Being embedded, at the point, he included the option of this feat in his attack Arsenal a few days after the release of the patch, causing the unmatched victims to promote the infection when an malicious exposure in the arsenal distributed into the patches.

Room

“Although this option does not actually expose the NTLMV2 hash, it reports that the file was loaded with the same unusual interactions with users,” the cybersecurity campaign said.

“On devices that are vulnerable to the CVE-2024-43451, the Webdav request is launched before the user manually interacts with the file with the same unusual behavior. Meanwhile, on the corrected and unprocessed systems, by pressing the angry file .url.

The check noted that the “quick response” serves to emphasize the technical examination of the group and its ability to adapt and pursue new methods of attack in the conditions of developing security protection.

Smoking for the origin of the actor threatening is the GITHUB repository, which showed that the actor threatens in the UTC-5 temporary belt, coordinating with several South America countries.

Cybersecurity

That’s not all. The fact that it seems to be an operational mistake, analysis of the story of the repository revealed a file containing a couple of account with passages with 1634 unique email addresses.

While the HTML file called “Ver Datos del Formulario.html” was removed from the repository on February 25, 2025, it contained details such as users, passwords, email, passwords and pins with ATMs associated with people, state bodies, educational institutions.

“The key factor of its success is its ability to use legitimate platforms for file sharing, including Google Drive, Dropbox, Bitbucket and GitHub, allowing it to bypass traditional security measures and distribute malicious software,” said Check Point.

“In addition, its use of underground tools from criminal service, such as Remcos Rat, Heartcrypt and Purecrypter, enhances its deep ties with the cyber -ecosystem, providing access to sophisticated evasion methods and resistant methods.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.