Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Blind Eagle hacks Columbian institutions using NTLM defects, rats, GitHub-based attacks
Identity

Blind Eagle hacks Columbian institutions using NTLM defects, rats, GitHub-based attacks

userBy userMarch 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Github-based attacks

The threat actor known as Blind Eagle has been linked to a series of ongoing campaigns targeting Colombian agencies and government agencies since November 2024.

“The monitored campaign targets Colombian judicial agencies and other government or private organizations, with high infection rates,” Checkpoint said in a new analysis.

“One of these campaigns took place around December 19, 2024 affected more than 1,600 casualties. This infection rate is important considering Blind Eagle’s targeting approach.”

The Blind Eagle, which has been active since at least 2018, has also been tracked as Aguilaciega, APT-C-36, and APT-Q-98. It is known for its ultra-specific targeting of entities in South America, particularly Colombia and Ecuadorian.

Cybersecurity

An attack chain, organized by threat actors, often uses social engineering tactics in the form of spear phishing emails, gaining initial access to the target system and ultimately drops remote access trojans such as Asyncrat, NJRAT, Quasar Rat, and Remcos Rat, which are available.

The latest intrusion set is notable for three reasons. Using the currently patched Microsoft Windows flaw (CVE-2024-43451) exploit variant, adoption of a new packer As-A-Service (PAAS) called HeartCrypt, and distribution of payloads via Bitbucket and Gith Drigbox and Google Drive.

Specifically, HeartCrypt is used to protect malicious executables, which are variants of the person responsible for launching Remcos rat malware hosted in the currently removed Bitbucket or Github repository.

CVE-2024-43451 refers to the NTLMV2 hash disclosure vulnerability fixed by Microsoft in November 2024. For each checkpoint, Blind Eagle incorporated a variant of this attack.

Blind Eagle

“This variant doesn’t actually publish an NTLMV2 hash, but it notifies threat actors that the file has been downloaded due to the same unusual user file interaction,” the cybersecurity company said.

“A device vulnerable to CVE-2024-43451 triggers a WebDav request before the user interacts with the file manually with the same anomalous behavior. Meanwhile, on both patched and unpaid systems, click on the malicious .url file to begin downloading and performing the next stage of payment.”

Checkpoint noted that “quick response” helps to highlight the group’s technical expertise and the ability to adapt and pursue new attack methods in the face of evolving security defenses.

It is GitHub repository that serves smoking guns for the origins of the threat actor, and it has been revealed that the threat actors operate in the UTC-5 time zone and are working with several South American countries.

Cybersecurity

That’s not all. In what appears to be an operational error, analysis of repository commit history revealed a file containing account password pairs containing 1,634 unique email addresses.

The HTML file named “veratos del formulaio.html” was removed from the repository on February 25, 2025, but is known to contain details such as username, password, email, email password, and ATM pins related to individuals, government agencies, educational institutions, and operators in Colombia.

“A key element of success is the ability to leverage legitimate file sharing platforms like Google Drive, Dropbox, Bitbucket and GitHub, allowing traditional security measures to be used to distribute malware secretly,” Check Point said.

“In addition, the use of underground Crimeware tools such as Remcos Rat, HeartClypt and Purecrypter will enhance deep connections with the cybercrime ecosystem and grant access to sophisticated evasion techniques and persistent ways of access.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMETA is testing its first in-house AI training chip to reduce reliance on NVIDIA and SLASH AI infrastructure costs
Next Article The role of cable markers in AI-driven industrial automation
user
  • Website

Related Posts

Over 38,000 Freedrain subdomains have been discovered after exploiting SEO to steal crypto wallet seed phrases

May 8, 2025

SONICWALL Patch 3 flaws in SMA 100 devices allow attackers to execute code as root

May 8, 2025

Qilin ransomware ranked best in April 2025 with over 45 data leak disclosures

May 8, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

One corner that generates revenue in the energy market is well maintained

Police say two students turned themselves back after a fatal stab wound outside a California high school

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

Trending Posts

The documentary sheds light on Biden’s reaction to the murder of Shireen Abuakure | News in the Occupy West Bank

May 8, 2025

Key Takeout: Documentary name is Al Jazeera’s Abuakure Murderer | Crime News

May 8, 2025

US-UK Trade Contract: How is Trump’s global tariff talks formed? | International Trade News

May 8, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Health Technology Startup Kouper emerges from $10 million stealth in funding to transform the patient care transition

Did Figma kill Webflow and Framer with the release of the Figma site?

Metaworld Congress 2025: Madrid Takes Center Stage in Digital Innovation

Coinbase wins DeRibit for $2.9 billion and earns a major push to crypto derivatives

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.