EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed “Operation FlightNight” targeting Indian government entities and energy companies.
The attackers, likely state-sponsored, leveraged a modified version of the open-source information stealer HackBrowserData to steal sensitive data.
EclecticIQ identified that the attackers used Slack channels, a popular communication platform, as exfiltration points.
These channels were named “FlightNight,” giving the operation its name.
The attackers successfully infiltrated multiple government agencies responsible for communication, IT, and national defense.
Are you from The Team of SOC, Network Security, or Security Manager or CSO? Download Perimeter’s Guide to how cloud-based, converged network security improves security and reduces TCO.
Adapt to the changing threat landscape effortlessly with Perimeter 81’s cloud-based, unified network security platform.
Additionally, private energy companies were compromised, with details about financial documents, employee information, and even oil and gas drilling activities stolen.
A staggering 8.81 GB of data was exfiltrated, potentially aiding future intrusions.
The attackers used a trick to get victims to install malware.
They sent emails disguised as invitations from the Indian Air Force.
These emails contained an ISO file, which appeared to be a harmless archive.
However, when the victim opened the ISO file, it actually launched a shortcut file (LNK) disguised as a PDF document.
Clicking the LNK file unknowingly activated the malware.
The malware then exfiltrated confidential documents, private emails, and cached web browser data.
The stolen data included documents, emails, and browsing history.
Instead of sending the stolen data directly to the attackers, the malware uploaded it to channels on a communication platform called Slack.
To make it appear like normal activity on the network and to help the attackers avoid detection.
The attackers modified an existing tool called HackBrowserData to add new features like document theft and communication through Slack.
Analysis of the code confirmed these modifications.
The malware also used a specific naming scheme for temporary files and targeted certain file types like documents and databases to steal data faster.
The malware made a big mistake by storing the keys needed to access and control the Slack channels directly in its code.
EclecticIQ researchers found these keys and used them to access the Slack channels where the stolen data was uploaded.
These channels contained information for the researchers:
Another mistake was testing the connectivity over Slack workspaces.
This helped researchers understand even more about the attacker’s setup, including details about the Slack team and the bots used to communicate.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
Amazon Web Services (AWS) has issued a critical security advisory highlighting vulnerabilities in specific versions…
Rockstar2FA is a PaaS kit that mimics the legitimate credential-request behavior of cloud/SaaS platforms. Phishing…
A Russian software developer, aided by the National Technology Initiative, has introduced a groundbreaking AI…
A serious security flaw has been identified in Ivanti Connect Secure, designated as CVE-2025-0282, which enables…
Let’s Encrypt has announced plans to introduce six-day certificate options and support for IP address…
As a dedicated bug bounty hunter with an enviable track record on BugCrowd, Abdullah Nawaf, Full…