<div dir="ltr"><a href="https://www.csoonline.com/article/3585137/elusive-hacker-for-hire-group-bahamut-linked-to-historical-attack-campaigns.html#tk.rss_news">https://www.csoonline.com/article/3585137/elusive-hacker-for-hire-group-bahamut-linked-to-historical-attack-campaigns.html#tk.rss_news</a><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><div dir="ltr"><span></span></div><div dir="ltr"><div><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><b><span style="font-size:10pt"></span></b><span style="font-size:10pt"></span><span style="font-family:arial,helvetica,sans-serif"></span><p>Attack attribution is one of the most difficult aspects of <a href="https://www.csoonline.com/article/3295877/what-is-malware-viruses-worms-trojans-and-beyond.html">malware</a>
research and it's not uncommon for different security companies to
attribute attack campaigns to different threat actors only to later
discover that they were the work of the same group. Against this
backdrop, a new paper by researchers at Blackberry stands out by
exposing an elusive group dubbed Bahamut as responsible for a spider web
of carefully constructed and carried out <a href="https://www.csoonline.com/article/2117843/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html">phishing</a> and malware attacks.</p><p>The
group's hacking activities trace back to at least 2016 and involve
malware for Windows, macOS, iOS and Android. They have impacted a
diverse range of individuals, including government officials,
separatists and human rights activists from several countries. Some of
the group's campaigns were documented by many researchers or security
companies over the years but they were unattributed or attributed to
threat actors using different names.</p><p>"Over the years, researchers at several other organizations including
Amnesty International, Kaspersky, Trend Micro, Cymmetria, DarkMatter,
ESET, Norman, Antiy, Forcepoint, Symantec, Palo Alto, Fortinet, 4Hou,
Bitdefender, Cisco Talos, Microsoft, Qianxin, and others gave us a
different view of Bahamut, often under different names," the BlackBerry
researchers said in <a href="https://www.blackberry.com/us/en/forms/enterprise/bahamut-report" rel="nofollow noopener" target="_blank">their paper</a>. "Many speculated openly about what it was they were analyzing and where the group’s distinctive features might lead them."</p><p>According to BlackBerry's assessment, Bahamut, <a href="https://www.bellingcat.com/news/mena/2017/06/12/bahamut-pursuing-cyber-espionage-actor-middle-east/" rel="nofollow noopener" target="_blank">which was named</a>
by researchers writing for open-source intelligence site Bellingcat in
2017, is the same group described in previous research by different
companies as EHDEVEL, <a href="https://unit42.paloaltonetworks.com/shifting-in-the-wind-windshift-attacks-target-middle-eastern-governments/" rel="nofollow noopener" target="_blank">Windshift</a>,
URPAGE and The White Company, as well as the actor responsible for the
campaigns described by Kaspersky Lab in 2016 in its research on the
InPage zero-day vulnerability, Cisco Talos' <a href="https://blog.talosintelligence.com/2018/07/Mobile-Malware-Campaign-uses-Malicious-MDM-Part2.html?__cf_chl_captcha_tk__=cddad34c27f91e0a64a" rel="nofollow noopener" target="_blank">research on malicious MDM</a> and <a href="https://ti.qianxin.com/blog/articles/analysis-of-targeted-attack-against-pakistan-by-exploiting-inpage-vulnerability-and-related-apt-groups-english/" rel="nofollow noopener" target="_blank">the attack against Pakistan</a> research from Qianxin.</p><h2>What is Bahamut and how does it operate?</h2><p>Based on the group's
varied and carefully segmented attack campaigns that target both
high-value individuals and larger groups of people across different
regions with different geopolitical interests, the BlackBerry
researchers believe it's plausible that Bahamut is a mercenary group
that sells its services to different clients. This theory was first
proposed in 2017 <a href="https://www.bellingcat.com/resources/case-studies/2017/10/27/bahamut-revisited-cyber-espionage-middle-east-south-asia/" rel="nofollow noopener" target="_blank">by researchers writing for Bellingcat</a>.</p><p>Hacker-for-hire groups that use APT-style techniques have become a common element of the threat landscape in recent years, <a href="https://www.csoonline.com/article/3573081/apt-style-mercenary-groups-challenge-the-threat-models-of-many-organizations.html" rel="noopener" target="_blank">challenging the threat models of many businesses</a>. However, Bahamut stands apart even among cyberespionage groups for its attention to detail, <a href="https://www.csoonline.com/article/3391566/what-is-opsec-a-process-for-protecting-critical-information.html">operational security</a> and considerable efforts spent to learn the behavior of their targets.</p> <p>According
to BlackBerry, Bahamut relies heavily on manipulating its victims
through a constantly shifting web of fake social media accounts and
personas and even fake news websites and applications that don't appear
to be malicious and often generate original content. This is meant to
exploit the victims' interests and earn their trust.</p><p>"First encounters with Bahamut begin innocently," the researchers
said. "One might start with a simple direct message on Twitter or
LinkedIn from an attractive woman, but with no suspicious link to click.
Another might occur when scrolling through Twitter or Facebook in the
form of a tech news article. Maybe you’d be taking a break at work and
checking out a fitness website. Or perhaps you’re a supporter of Sikh
rights looking for news about their movement for independence. You’d
click, and nothing bad would appear to happen. On the contrary, you’d
experience a legitimate, yet fabricated reality."</p> <p>One
example is a technology news website that was at some point focused on
mobile device reviews. At some point it was taken over by the group and
the tone and nature of the articles changed to include security research
and geopolitical themes. Its list of contributors now includes fake
personas whose photos are of real news anchors and reporters working for
local US TV stations. The site even has Twitter and Facebook accounts,
even though their number of followers is very low.</p><p>This highlights
the lengths the group is prepared to go and the efforts it's willing to
put in to reach its intended targets. While the tech news website
appears to generate original content, another site operated in the past
by the group called Times of Arab was mirroring legitimate news articles
from other websites.</p><p>The researchers identified a large number of fake websites tied to
Bahamut that appeared to have no relation to one another and served a
variety of interests, including exploits sales, fitness, travel, Sikh
independence and secession in India. Some of them were benign, but
others were used for phishing purposes. In addition to the websites, a
plethora of fake social media accounts promoted or directed people to
these websites.</p><p>Bahamut's activities have historically focused on
the Middle East in countries such as Egypt, Iran, Palestine, Turkey,
Tunisia, Saudi Arabia, Qatar and the United Arab Emirates with targets
including government officials, diplomats, human rights NGOs and
activists, journalists, Islamic scholars and more. Another nexus of
activity was observed in South Asia, with India and Pakistan in
particular and a focus on Sikh rights advocates and Islamist groups
active in the Kashmir region. Other campaigns that have been documented
in the past and have now been attributed to Bahamut targeted users in
China and Europe. The group has also targeted individuals working for
companies from the technology, media, aerospace and financial
industries.</p> <p>The
group is well versed in the art of phishing and targets victims on
their personal email accounts rather than their government or corporate
addresses. If their first attempt is unsuccessful, the attackers follow
up with a second email that includes personal information about the
victim, like their phone number, in an attempt to gain more credibility.</p><p>"Throughout our analysis of their phishing behavior, BlackBerry
observed that Bahamut was generally in possession of a great deal of
information about their targets prior to phishing them," the researchers
said. "This was clearly the result of a concerted and robust
reconnaissance operation. BlackBerry strongly suspects that much of the
data came as a direct result of the group’s extensive deployment of
'fakes.' Remember, the term 'fakes' here should be taken to mean any
attacker-controlled websites designed to imitate another website, any
attacker owned social media profiles, or any attacker-controlled website
designed to disseminate information."</p><p>BlackBerry observed Bahamut
phishing pages that mimicked various government agency login pages but
also most of the public email and messaging services including Gmail,
Yahoo, Apple ID, Twitter, Facebook, Telegram, Microsoft Live, Microsoft
OneDrive, Sina and ProtonMail. Victims are taken to the phishing pages
through numerous redirects using URL shortening services and the
phishing sites are sometimes live only for a few hours, making it hard
for security researchers to analyze their campaigns.</p><p>The group
also carefully monitors any research the security industry releases
about its campaigns and immediately shuts down and replaces the exposed
infrastructure. They also appear to learn from the mistakes that allowed
researchers to track down their websites and servers and avoid them in
the future.</p><h2>Android and iOS malware</h2><p>A big part of Bahamut's tradecraft
involves the creation and use of backdoored Android and iOS
applications. The BlackBerry researchers found multiple such
applications on the official app stores for both mobile platforms that
managed to bypass Google and Apple's reviews and code checks. Most of
them were only available in certain countries where the group's intended
victims were located.</p><p>The applications were all posted from
separate developer accounts, had well designed descriptions, screenshots
and websites with clearly written privacy policies and terms of
service. This suggests a lot of effort and attention to detail went into
creating them.</p><p>The nature of the applications varied from call
recording to music and video playing, fitness tracking, messaging and
VOIP, password management or Muslim prayer reminders. The researchers
also found applications that were distributed outside the official app
stores, but in most cases the applications had legitimate functionality
and had been created using well-known libraries to avoid raising
suspicion.</p><p>On Android, the apps could enumerate files with
different file types on the devices and upload them to a server. Some
samples also had the ability to enumerate device information, access
contacts, access call records, access SMS messages, record phone calls,
record audio, record video, download and update the backdoor and track
GPS location.</p><p>On iOS, the malicious functionality was more
limited, but had access to various pieces of data such as access and
location information, health data, calendar data, keyboard input,
credentials inputted into the application for various accounts, contact
information, files located on the device and more. The password manager
application was designed so that the passwords stored by users were
encrypted in a way that attackers could decrypt it and was synchronized
with a server under their control.</p><h2>Windows and macOS malware</h2><p>The Windows and macOS malware
associated with Bahamut has been documented in various reports over the
years. The group used downloaders and backdoors written in several
programming languages but has a preference for Visual Basic 6. Even
though this is considered a simple language from a programming
perspective, it has benefits for malware authors since it's one of the
hardest to reverse engineer by malware analysts if the code is compiled
natively.</p><p>The group also used an encoding method in its malware
that takes advantage of floating-point calculations which are performed
on the CPU's math co-processor. This requires a deeper understanding of
the x87 architecture and is not commonly seen in malware, according to
the BlackBerry researchers, which suggests Bahamut's coders are skilled
programmers.</p><p>The group borrows tools and mimics the techniques of
other threat actors and this has probably contributed to its campaigns
flying under the radar or being attributed to other threat actors. It
has also used at least one <a href="https://www.csoonline.com/article/3284084/what-is-a-zero-day-a-powerful-but-fragile-weapon.html">zero-day exploit</a> in the past that was likely originally developed by Chinese hackers.</p><p>Bahamut's
malware includes checks for analysis tools commonly used by researchers
and antivirus programs, some of which are only popular in certain
regions of the world where its targets are located.</p><h2>Impressive operational security</h2><p>The BlackBerry researchers
have observed some impressive operational security measures taken by the
group that exceed those of other <a href="https://www.csoonline.com/article/2615666/5-signs-youve-been-hit-with-an-apt.html">APT</a>
groups, including state-sponsored ones. In addition to having the
resources and funds to quickly abandon and change infrastructure when
exposed, the group compartmentalizes its various campaigns.</p><p>"We
find, for example, that no domains or IP addresses used to control or
distribute Windows malware are used for phishing or to administer
malware designed for any other operating system," the researchers said.
"Similarly, it is rare that any single server is used for more than a
single mobile application at any given time."</p><p>The group uses more
than 50 different hosting providers to ensure operational continuity,
which is likely a very time consuming and expensive effort. It's also
very meticulous with domain registrations, using different domain
registrars and resellers, using different privacy services and not
associating many domains with the same email address. Despite all these
efforts, the group has still made mistakes that allowed researchers to
trace an impressive number of previously unattributed or misattributed
campaigns back to it.</p><p>"Operational security will become
increasingly important as more and more intelligence functions are
outsourced by governments, corporations, and private individuals to
groups like Bahamut," the BlackBerry researchers said. "For, while these
third parties add a layer of plausible deniability for those who employ
them, they also introduce additional weaknesses that are not always
immediately obvious."</p></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div></div>