EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed “Operation FlightNight” targeting Indian government entities and energy companies.
The attackers, likely state-sponsored, leveraged a modified version of the open-source information stealer HackBrowserData to steal sensitive data.
EclecticIQ identified that the attackers used Slack channels, a popular communication platform, as exfiltration points.
These channels were named “FlightNight,” giving the operation its name.
The attackers successfully infiltrated multiple government agencies responsible for communication, IT, and national defense.
Are you from The Team of SOC, Network Security, or Security Manager or CSO? Download Perimeter’s Guide to how cloud-based, converged network security improves security and reduces TCO.
Adapt to the changing threat landscape effortlessly with Perimeter 81’s cloud-based, unified network security platform.
Additionally, private energy companies were compromised, with details about financial documents, employee information, and even oil and gas drilling activities stolen.
A staggering 8.81 GB of data was exfiltrated, potentially aiding future intrusions.
The attackers used a trick to get victims to install malware.
They sent emails disguised as invitations from the Indian Air Force.
These emails contained an ISO file, which appeared to be a harmless archive.
However, when the victim opened the ISO file, it actually launched a shortcut file (LNK) disguised as a PDF document.
Clicking the LNK file unknowingly activated the malware.
The malware then exfiltrated confidential documents, private emails, and cached web browser data.
The stolen data included documents, emails, and browsing history.
Instead of sending the stolen data directly to the attackers, the malware uploaded it to channels on a communication platform called Slack.
To make it appear like normal activity on the network and to help the attackers avoid detection.
The attackers modified an existing tool called HackBrowserData to add new features like document theft and communication through Slack.
Analysis of the code confirmed these modifications.
The malware also used a specific naming scheme for temporary files and targeted certain file types like documents and databases to steal data faster.
The malware made a big mistake by storing the keys needed to access and control the Slack channels directly in its code.
EclecticIQ researchers found these keys and used them to access the Slack channels where the stolen data was uploaded.
These channels contained information for the researchers:
Another mistake was testing the connectivity over Slack workspaces.
This helped researchers understand even more about the attacker’s setup, including details about the Slack team and the bots used to communicate.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Malicious actors have taken cybercrime to new heights by exploiting captcha verification pages, a typically…
Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer. A…
The healthcare communication platform ConnectOnCall, operated by ConnectOnCall.com, LLC, has confirmed a significant data breach…
Kali Linux has unveiled its final release for 2024, version Kali Linux 2024.4, packed with…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert, adding two significant…
It’s clear that a person’s reputation is increasingly influenced by their online presence, which spans…