• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
bladehawk attackers target kurds with android apps

BladeHawk Attackers Target Kurds with Android Apps

You are here: Home / Latest Cyber Security Vulnerabilities / BladeHawk Attackers Target Kurds with Android Apps
September 9, 2021

Pro-Kurd Fb profiles provide ‘888 RAT’ and ‘SpyNote’ trojans, masked as respectable applications, to complete mobile espionage.

Attackers have been concentrating on the Kurdish ethic group for extra than a yr by way of an Fb-centered spy ware marketing campaign that disguises backdoors in legit Android apps, scientists have located.

A group termed BladeHawk is at the rear of the marketing campaign, identified by scientists from cybersecurity company ESET and energetic because at minimum March 2020, according to a report released this 7 days. The campaign disguises the 888 RAT in Android applications applying devoted Fb profiles, researchers support.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


“These profiles appeared to be furnishing Android information in Kurdish, and information for the Kurds’ supporters,” ESET malware researcher Lukas Stefanko wrote in the report, posted Wednesday. “Some of the profiles deliberately spread more spying applications to Facebook community groups with pro-Kurd written content.”

All in all, scientists determined six profiles as component of the BladeHawk marketing campaign, which have been sharing the Android spying applications and focused about 11,000 followers as a result of 28 special posts. The profiles have been documented to Facebook and considering the fact that disabled, Stefanko mentioned.

Each of these posts in the campaign contained bogus app descriptions and hyperlinks to download an app, according to the put up. Researches downloaded 17 distinctive Android software deals (APKs) from these hyperlinks, some of which pointed right to the destructive applications.

“Two of the profiles were aimed at tech buyers, even though the other 4 posed as Kurd supporters,” he wrote. “All these profiles were being produced in 2020 and soon just after creation they started publishing these faux applications. These accounts, besides for a single, have not posted any other content material in addition to Android RATs masquerading as genuine applications.”

Other hyperlinks pointed to the 3rd-party upload service top rated4top rated.io, which tracks the selection of file downloads. Data from that service reveals that there have been at minimum 1,481 downloads of the malicious apps from URLs promoted in just a few Facebook posts between July 20, 2020 and June 28 of this yr, researchers observed.

Attackers also shared espionage apps to general public Facebook teams, most of which guidance of Masoud Barzani, the previous president of the Kurdistan Location, Stefanko said.

Payload Action

The important payload of the marketing campaign is the multiplatform 888 RAT, which beforehand was utilised in two other organized campaigns—one focusing on TikTok buyers with TikTok Pro spy ware and an additional by the Kasablanka group, in accordance to ESET. In a single occasion, the campaign spread the SpyNote trojan, which is an older and nicely-recognized business spy resource that has a record of masquerading as legit apps, which include Netflix.

888 RAT initially only was printed for the Windows ecosystem and sold on the Dark Web for $80. In June 2018, a Pro edition of the RAT costing $150 extended its capacity for Android, although an Extreme edition unveiled later and bought for $200 could create Linux-based mostly payloads as properly.

The 888 RAT applied in the BladeHawk marketing campaign involves the means to: Steal and delete documents from a unit consider screenshots get system place get a list of set up apps steal user shots choose photographs history surrounding audio and phone phone calls make phone calls steal SMS messages steal the device’s call checklist and send textual content messages.

The RAT also can phish Facebook credentials by deploying activity that seems to be coming from the legit Facebook application, Stefanko wrote.

“When the person taps on the current applications button, this activity will seem authentic,” he wrote. “However, following a very long push on this app’s icon, as in Determine 8, the legitimate app title liable for the Facebook login ask for is disclosed.”

ESET has published a record of file names, Fb profiles and groups, and distribution and phishing inbound links linked with the BladeHawk marketing campaign in the article.

It’s time to evolve menace searching into a pursuit of adversaries. JOIN Threatpost and Cybersixgill for Threat Looking to Catch Adversaries, Not Just Prevent Attacks and get a guided tour of the dark web and study how to keep track of danger actors right before their upcoming attack. REGISTER NOW for the Reside discussion on Sept. 22 at 2 p.m. EST with Cybersixgill’s Sumukh Tendulkar and Edan Cohen, together with impartial researcher and vCISO Chris Roberts and Threatpost host Becky Bracken.

 


Some sections of this posting are sourced from:
threatpost.com

Previous Post: «azure container instances users urged to ​​revoke privileged credentials after Azure Container Instances users urged to ​​revoke privileged credentials after flaw discovery
Next Post: Weekly threat roundup: Atlassian, Microsoft Office, Zoho ManageEngine weekly threat roundup: atlassian, microsoft office, zoho manageengine»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.