A cyber-espionage group generally known as Bitter (APT-Q-37), extensively thought to function from South Asia, is utilizing new, sneaky strategies to put in a malicious backdoor program on computer systems belonging to high-value targets.
This group has a protracted historical past of stealing delicate data from organisations, particularly these within the authorities, electrical energy, and army industries in international locations like China and Pakistan.
The Qi’anxin Risk Intelligence Centre lately uncovered these new assaults, which intention to deploy a single C# backdoor that may remotely obtain and run different dangerous software program (EXE recordsdata) on the sufferer’s machine.
Two New Methods to Sneak In
In response to researchers, Bitter APT is utilizing at the very least two completely different strategies to deploy this backdoor, together with a pretend convention file and an archive file.
Faux Convention File (Mode 1)
The primary technique makes use of a particular Microsoft Workplace file, on this case named Nominated Officers for the Convention.xlam. When the sufferer permits the built-in directions (macros), a pretend error message saying “File parsing failed, content material corrupted,” is exhibited to idiot the consumer.
In the meantime, the macro silently builds the C# backdoor code utilizing native laptop instruments (like these from the .NET framework) to show it right into a working program (vlcplayer.dll). Moreover, the attackers arrange a scheduled activity utilizing a script to make sure the backdoor stays energetic on the pc, connecting to an online deal with related to the group to retrieve extra instructions.
Difficult Archive File (Mode 2)
That is the sneakier technique of the 2, involving a compressed file (RAR archive) that exploits an older, unpatched flaw within the WinRAR software program, the precise vulnerability of which stays unclear on the time of writing.
This malicious RAR file (titled Provision of Info for Sectoral for AJK.rar) accommodates a harmless-looking Phrase file together with a hidden, malicious template file referred to as Regular.dotm.
If a consumer extracts this archive, the flaw permits Regular.dotm to switch the actual template file of their system. When the sufferer opens any Phrase doc, this system hundreds the tampered template, which then connects to a distant server to run the ultimate backdoor program (winnsc.exe), which performs the identical dangerous actions because the one in Mode 1.
Frequent Purpose: Stealing Knowledge
It’s value noting that each assaults finally set up the identical C# backdoor to gather fundamental gadget data. Researchers word that the infrastructure utilized in these two separate assaults, together with domains registered in April this yr, strongly factors to the Bitter group.
“The above two assaults finally use the identical C# backdoor, and the C&C server of the backdoor communication factors to the sub-domain of esanojinjasvc.com, which was registered in April this yr, so we will assume that these samples come from the identical assault group,” researchers famous within the weblog submit.
To remain secure, the Centre urges customers to be very cautious with unknown e mail attachments, hold software program like WinRAR updated, disable macros, monitor community visitors for suspicious exercise, and use specialised instruments like a sandbox to securely examine untrusted recordsdata.

