Sunday, April 27, 2025
HomeCyber AttackBitter APT Hackers Uses Non-existent Email Account/Domain To Send Weaponized Emails

Bitter APT Hackers Uses Non-existent Email Account/Domain To Send Weaponized Emails

Published on

SIEM as a Service

Follow Us on Google News

The government of Bangladesh has been targeted more than once by Bitter, an APT group that focuses on cyberespionage. It has developed a new malware that enables it to download and execute remote files.

A typical example of Bitter’s targeting scope, which has not changed since 2013, is the campaign, which has been ongoing since August 2021. The threat analysts at Cisco Talos discovered the campaign and provided details on how it was executed.

Citing IP address overlap, encryption commonality, and module name scheme, Cisco Talos researchers attribute this campaign in part to Bitter.

- Advertisement - Google News

Malicious Infection Chain

Cisco detected two infection chains and both started with spear-phishing emails, during this campaign targeting various government organizations in Bangladesh. Here, to make the messages appear as if they came from a government organization in Pakistan, they have been sent via spoofed email addresses.

In this case, an attacker likely exploited a vulnerability in the Zimbra mail server, which enabled attackers to send emails from an illegitimate address.

One of the main differences between the two infection chains is the type of attachment included in the malicious email and here they are:- 

  • One has an .RTF document.
  • The other one has an .XLSX document.

These RTF documents can be exploited to trigger remote code execution by exploiting CVE-2017-11882 and getting access to machines using vulnerable versions of Microsoft Office and run arbitrary code.

An exploit for two CVEs, CVE-2018-0798 and CVE-2018-0802, are triggered by opening the Excel spreadsheet. On outdated versions of Microsoft Office, remote code execution (RCE) is the result.

A scheduled task that is created by the exploit is in charge of downloading the payload for this particular attack. This task succeeds in connecting to the host server and downloading the trojan every five minutes after the initial infection.

ZxxZ Trojan

The executable file zxxZ is a 32-bit version of Visual C++ compiled as a 32-bit version of the malware that sends data back to the C2 server with a separator used only by the malware.

The experts at Cisco Talos stated:-

“The trojan masquerades as a Windows Security update service and allows the malicious actor to perform remote code execution, opening the door to other activities by installing other tools.”

Moreover, a number of anti-detection features are employed by the malware, such as obfuscated strings, as well as the ability to look for and kill Kaspersky and Windows Defender processes.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...