HomeIndian Air ForceCyber Espionage Strikes Indian Air Force: Malware Disguised in ‘Su-30 Aircraft Procurement’...

Cyber Espionage Strikes Indian Air Force: Malware Disguised in ‘Su-30 Aircraft Procurement’ File

Source : The Cyber Express

Cyber Espionage Strikes Indian Air Force: Malware Disguised in ‘SU-30 Aircraft Procurement’ File

Cyber Espionage Strikes Indian Air Force: Malware Disguised in ‘SU-30 Aircraft Procurement’ File

A sophisticated cyber espionage attack targeting the Indian Air Force has come to light. The cyberattack on the Indian Air Force involves a variant of the notorious Go Stealer, a malicious software designed to stealthily extract sensitive information.

The malware, distributed through a cunningly named ZIP file, “SU-30_Aircraft_Procurement,” takes advantage of recent defense procurement announcements, notably the approval of 12 Su-30 MKI fighter jets by the Indian Defense Ministry in September 2023.

Cyberattack on the Indian Air Force

Cyberattack on the Indian Air Force
Source: Cyble

According to Cyble Research and Intelligence Labs (CRIL), the modus operandi of this cyber threat unfolds through a series of carefully orchestrated steps. The attackers employ an anonymous file storage platform called Oshi to host the deceptive ZIP file, disguising it as critical defense documentation. The link, “hxxps://oshi[.]at/ougg,” likely circulates through spam emails or other communication channels.

The sequence of infection involves the progression from a ZIP file to an ISO file, followed by a .lnk file, culminating in the deployment of the Go Stealer payload. The attackers strategically exploit the mounting tension surrounding defense procurement to lure Indian Air Force professionals into unwittingly triggering the malware.

Technical Analysis of the Go Stealer

Analysis of the Go Stealer
Source: Cyble

The identified Go Stealer variant, distinct from its GitHub counterpart, boasts advanced features that elevate its threat level. It is coded in the Go programming language and inherits its base from an open-source Go Stealer available on GitHub. This variant, however, introduces enhancements, including an expanded scope for browser targeting and a novel method of data exfiltration through Slack.

GitHub Repository
Source: Cyble

Upon execution, the stealer generates a log file in the victim’s system, utilizing GoLang tools such as GoReSym for in-depth analysis. The malware is meticulously designed to extract login credentials and cookies from specific internet browsers, namely Google Chrome, Edge, and Brave.

Stealing Data from Chrome
Source: Cyble

The targeted approach signifies a strategic intent to gather precise and sensitive information from Indian Air Force professionals.

GoReSym Output
Source: Cyble

Data Exfiltration and Covert Communications

Unlike conventional information stealers, this variant displays a heightened sophistication by leveraging the Slack API for covert communications. The choice of Slack as a communication channel aligns with the platform’s widespread use in enterprise networks, enabling malicious activities to seamlessly blend with regular business traffic.

Exfiltration using Slack
Source: Cyble

The Go Stealer variant introduces a function named “main_Vulpx” designed explicitly for uploading stolen data to the attacker’s Slack channel. This evolution in tactics allows threat actors to maintain communication and receive pilfered data discreetly.

The identified Go Stealer, disseminated through the deceptive ZIP file named “SU-30_Aircraft_Procurement,” poses a large threat to Indian Defense Personnel.

The timing of the attack, coinciding with the Indian Government’s announcement of the Su-30 MKI fighter jets procurement, raises concerns about targeted attacks or espionage activities.

This variant of Go Stealer showcases a level of sophistication not observed in its GitHub counterpart, featuring expanded browser targeting capabilities and leveraging Slack for data exfiltration.

The strategic focus on selectively harvesting login credentials and cookies from browsers highlights the threat actor’s intent to acquire precise and sensitive information from Indian Air Force professionals.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Aatmanirbhar Bharat

All

Rafale’s India operations get a strategic push; Dassault establishes maintenance facility near Jewar Airport

Dassault Aviation is in the process of acquiring land near Jewar International Airport to set up a Maintenance, Repair, and Overhaul (MRO) facility for...

Indian Army inducts first-ever indigenous chip-based made in India 4G base station from Signaltron

Indian army has inducted the first-ever indigenous chip-based 4G mobile base station, which it procured from Bangalore-based firm Signaltron through the government e-marketplace portal,...

AMCA 5th Generation Stealth Fighter Updates

AMCA to be integrated with sophisticated indigenous Distributed Aperture System (DAS) that making it a formidable air asset for the Indian Air Force

Source : IgMp Bureau India’s Advanced Medium Combat Aircraft (AMCA) is on the brink of a revolutionary transformation with the integration of a sophisticated Distributed...

AMCA to incorporate the best features of both 5th and 6th Generation fighters: ADA sources

Source : IgMp Bureau India's strides toward indigenous air dominance receive a substantial boost with the green signal for the Advanced Medium Combat Aircraft (AMCA)...

Most Popular

Recent Comments

Archive Months

Miscellanous

US Army embracing remote maintenance beyond Ukraine

WASHINGTON — The U.S. Army is applying the telemaintenance capability it developed in a parking lot in Poland to its most challenging logistical theater...

terror module: Gujarat Police bust terror module planning hits on prominent political leaders, 3 arrested

In a major bust, the Gujarat Police claimed to have busted a module that was planning to kill prominent political leaders across the country.Briefing...

North Korea test-launches 2 ballistic missiles, after end of new US-South Korea-Japan drill

North Korea test-fired two ballistic missile Monday, South Korea's military said, a day after the North vowed "offensive and overwhelming" responses to a new...

Moscow Attack: ISIS-K, group tied to Moscow attack, has grown bolder and more violent

Few know better than the Taliban what a relentless foe the Islamic State's affiliate in Afghanistan can be.Much of the West considers the Taliban,...
Visits
error: Content is protected !!