Discussion
Loading...

Post

Log in
  • About
  • Code of conduct
  • Privacy
  • Users
  • Instances
  • About Bonfire
Etienne / Tek
Etienne / Tek
@tek@todon.eu  ·  activity timestamp last month

I am reading about the BlingEagle #APT group (aka APT-C-36), has anyone seen any clear attribution? Or clear information of whether it is state-sponsored or cybercrime?
#infosec

  • Copy link
  • Flag this post
  • Block
Daniel Lunghi
Daniel Lunghi
@thehellu@infosec.exchange  ·  activity timestamp last month

@tek In 2019 we wrote something about them. Don't ask me why but it seems the link to our research is dead now, but you can find it here https://web.archive.org/web/20190719200241/https://blog.trendmicro.com/trendlabs-security-intelligence/spam-campaign-targets-colombian-entities-with-custom-proyecto-rat-email-service-yopmail-for-cc/

At the time, we stated the following: "Our findings indicate that the campaign appears to be the work of a group involved in business email compromise (BEC) or cybercrime, and unlikely to be an advanced persistent threat (APT)."
Part of this assessment comes from the targeted verticals: "Notably, we noticed that multiple employee savings funds (called “Fondo de empleados” in Colombia) were targeted. These entities barely have access to sensitive information, but they are likely to possess a reasonable amount of money."

I have not followed the group then (only a quick follow up in 2021 https://www.trendmicro.com/en_us/research/21/i/apt-c-36-updates-its-long-term-spam-campaign-against-south-ameri.html )

We did not perform incident response on this, so we could still be wrong. Hope this helps

Trend Micro

APT-C-36 Updates Its Long-term Spam Campaign Against South American Entities With Commodity RATs

We have continued tracking APT-C-36, also known as Blind Eagle, since our research on this threat actor in 2019. We share new findings of APT-C-36’s ongoing spam campaign targeting South American entities.

Spam Campaign Targets Colombian Entities with Custom-made ‘Proyecto RAT,’ Uses Email Service YOPmail for C&C - TrendLabs Security Intelligence Blog

We observed a recent campaign that primarily targets financial institutions and governmental organizations in the South American region, particularly in Colombia. This blog post covers the activities we observed, the remote access tools (RATs) used, the campaign's techniques and procedures, and its indicators of compromise (IoCs). Our findings indicate that the campaign appears to be the work of a group involved in business email compromise (BEC) or cybercrime, and unlikely to be an advanced persistent threat (APT).
  • Copy link
  • Flag this comment
  • Block

bonfire.cafe

A space for Bonfire maintainers and contributors to communicate

bonfire.cafe: About · Code of conduct · Privacy · Users · Instances
Bonfire social · 1.0.2-alpha.29 no JS en
Federation disabled
Log in
  • Explore
  • About
  • Members
  • Code of Conduct