Trellix reveals how the India-linked DoNot APT group launched a classy spear-phishing assault on a European overseas affairs ministry. Find out about their ways, the LoptikMod malware, and why this cyber espionage marketing campaign issues for world diplomacy.
A complicated marketing campaign by the infamous DoNot APT group, additionally recognized by names like APT-C-35 and Mint Tempest, has lately focused a European overseas affairs ministry. This assault, uncovered by the Trellix Superior Analysis Centre, highlights the group’s increasing attain past its conventional give attention to South Asia.
Lively since not less than 2016, the DoNot APT group is a persistent menace, primarily recognized for focusing on authorities, navy, and diplomatic organisations. This group is believed to function with a give attention to South Asian geopolitical pursuits and has been attributed by a number of distributors to have hyperlinks to India. This current incident, nevertheless, reveals a broadening of their operations into Europe.
Trellix’s researchers had been in a position to determine this marketing campaign by blocking the preliminary e-mail chain, which allowed them to analyse the assault’s Techniques, Methods, and Procedures (TTPs). Reportedly, the attackers employed a extremely misleading spear-phishing tactic, impersonating European defence officers.
These malicious emails, which talked about a go to to Bangladesh, aimed to trick targets into clicking on a dangerous Google Drive hyperlink. This technique of utilizing frequent cloud providers for preliminary an infection showcases the group’s adaptability of their strategy.
The assault unfolded in a number of calculated steps. The preliminary spear-phishing e-mail originated from a Gmail tackle (int.dte.afd.1@gmailcom
). It featured a topic line associated to diplomatic actions, particularly “Italian Defence Attaché Go to to Dhaka, Bangladesh.” The attackers even used HTML formatting with UTF-8 encoding to correctly show particular characters like “é” in “Attaché,” signifying consideration to element to extend legitimacy.
Upon clicking the Google Drive hyperlink, victims downloaded a malicious RAR archive named ‘SyClrLtr.rar
,’ containing an executable file disguised as a PDF (notflog.exe
). It deployed a batch file and established persistence, which means the malware would stay energetic by means of a scheduled activity set to run each 10 minutes.
The malware concerned on this marketing campaign is LoptikMod, a software completely related to the DoNot APT group since 2018. This malware gathers system particulars reminiscent of CPU mannequin, working system info, username, and hostname.
This info is then encrypted and despatched to a command and management (C2) server, which permits the attackers to keep up communication and probably exfiltrate delicate information. It’s price noting that past LoptikMod, the DoNot APT group additionally makes use of custom-built Home windows malware, together with backdoors like YTY and GEdit.
The focusing on of a European overseas affairs ministry highlights the group’s unwavering curiosity in amassing delicate info and its rising world attain. Such assaults on diplomatic entities are basic examples of espionage operations, aiming to achieve unauthorised entry to labeled state communications, coverage paperwork, and intelligence experiences.
Organisations, significantly these in authorities and diplomacy, are, therefore, urged to reinforce their cybersecurity measures, together with stronger e-mail safety, community site visitors evaluation, and endpoint detection and response (EDR) options, to defend in opposition to these evolving threats.