[ad_1]
A cybercrime group dubbed Bluebottle has been linked to a set of focused assaults in opposition to the monetary sector in Francophone nations positioned in Africa from at the least July 2022 to September 2022.
“The group makes in depth use of living-off-the-land, twin use instruments, and commodity malware, with no customized malware deployed on this marketing campaign,” Symantec, a division of Broadcom Software, stated in a report shared with The Hacker News.
The cybersecurity agency stated the exercise shares overlaps with a risk cluster tracked by Group-IB below the identify OPERA1ER, which has carried out dozens of assaults aimed toward banks, monetary providers, and telecom firms in Africa, Asia, and Latin America between 2018 and 2022.
The attribution stems from similarities within the toolset used, the assault infrastructure, the absence of bespoke malware, and the concentrating on of French-speaking nations in Africa. Three totally different unnamed monetary establishments in three African nations had been breached, though it is not identified whether or not Bluebottle efficiently monetized the assaults.
The financially motivated adversary, additionally identified by the identify DESKTOP-GROUP, has been chargeable for a string of heists totaling $11 million, with precise damages touching $30 million.
The latest assaults illustrate the group’s evolving techniques, together with using an off-the-shelf malware named GuLoader within the early phases of the an infection chain in addition to weaponizing kernel drivers to disable safety defenses.
Symantec stated it could not hint the preliminary intrusion vector, though it detected job-themed recordsdata on the sufferer networks, indicating that hiring associated phishing lures had been probably put to make use of to trick the targets into opening malicious e-mail attachments.
What’s extra, an assault detected in mid-May 2022 concerned the supply of an info stealer malware within the type of a ZIP file containing an executable display saver (.SCR) file. Also noticed in July 2022 was the usage of an optical disc picture (.ISO) file, which has been utilized by many a risk actor as a method of distributing malware.
“If the Bluebottle and OPERA1ER actors are certainly one and the identical, this could imply that they swapped out their an infection strategies between May and July 2022,” the researchers famous.
The spear-phishing attachments result in the deployment of GuLoader, which subsequently acts as a conduit to drop extra payloads on the machine, resembling Netwire, Quasar RAT, and Cobalt Strike Beacon. Lateral motion is facilitated by way of instruments like PsExec and SharpHound.
Another approach adopted by the group is the usage of a signed helper driver to terminate safety software program, a technique that has been utilized by a number of hacking crews for related functions, in line with findings from Mandiant, SentinelOne, and Sophos final month.
The indisputable fact that the identical driver (referred to as POORTRY by Mandiant) has been leveraged by a number of cybercriminal teams lends credence to the idea that these risk actors are utilizing a code signing service to get their malware move attestation mechanisms.
With the risk actors suspected to be French-speaking, it is probably that the assaults might broaden to different French-speaking nations the world over, the corporate cautioned.
“The effectiveness of its campaigns implies that Bluebottle is unlikely to cease this exercise,” the researchers stated. “It seems to be very centered on Francophone nations in Africa, so monetary establishments in these nations ought to stay on excessive alert.”

