Cyber-mercenary group Bahamut strikes again.
An infamous cyber-mercenary group is injecting Android devices with a spyware to steal users' conversations, new ESET research has found.
These malware attacks are launched via fake Android VPN apps, with evidence suggesting the hackers employed malicious versions of SecureVPN, SoftVPN and OpenVPN software.
Known as Bahamut ATP, the group is thought to be a service for hire that typically launches attacks through spear phishing messages and fake applications. According to previous reports, its hackers have been targeting both organizations and individuals across the Middle East and South Asia since 2016.
Estimated to have begun in January 2022, ESET researchers believe that the group's campaign of distributing malicious VPNs currently remains ongoing.
"The campaign appears to be highly targeted, as we see no instances in our telemetry data," said Lukáš Štefanko, the ESET researcher who first discovered the malware.
"Additionally, the app requests an activation key before the VPN and spyware functionality can be enabled. Both the activation key and website link are likely sent to targeted users."
Štefanko explains that, once the app is activated, Bahamut hackers can remotely control the spyware. This means that they are able to infiltrate and harvest a ton of users' sensitive data.
"The data exfiltration is done via the keylogging functionality of the malware, which misuses accessibility services," he said.
From SMS messages, call logs, device locations and any other details, to even encrypted messaging apps like WhatsApp, Telegram or Signal, these cybercriminals can spy on virtually anything they found on victims' devices without them knowing it.
ESET identified at least eight versions of these trojanaized VPN services, meaning that the campaign is well-maintained.
It is worth noting that in no instance was malicious software associated with the legitimate service, and none of the malware-infected apps were promoted on Google Play.
The initial distribution vector is still unknown, though. Looking back at how Bahamut ATP usually works, a malicious link could have been sent via email, social media or SMS.
Despite still being not clear who's behind, the Bahamut ATP seems to be a collective of mercenary hackers as their attacks don't really follow a specific political interest.
Bahamut has been prolifically conducting cyberespionage campaigns since 2016, mainly across the Middle East and South Asia.
The investigative journalism group Bellingcat was the one first exposing their operations in 2017, describing how both international and regional powers actively engaged in such surveillance operations.
"Bahamut is therefore notable as a vision of the future where modern communications has lowered barriers for smaller countries to conduct effective surveillance on domestic dissidents and to extend themselves beyond their borders," concluded Bellingcat at the time.
The group was then renamed Bahamut, after the giant fish floating in the Arabian Sea described in Jorge Luis Borges’ Book of Imaginary Beings.
More recently, another investigation highlighted how the Advanced Persistent Threat (APT) group is increasingly turning on mobile devices as a main target.
Cybersecurity firm Cyble first spotted this new trend last April, noting that the Bahamut group "plans their attack on the target, stays in the wild for a while, allows their attack to affect many individuals and organizations, and finally steals their data."
We engaged The Computer Geeks in mid-2023 as they have a reputation for API integration within the T . . . [MORE].
We all have been VERY pleased with Adrian's vigilance in monitoring the website and his quick and su . . . [MORE].
FIVE STARS + It's true, this is the place to go for your web site needs. In my case, Justin fixed my . . . [MORE].
We reached out to Rich and his team at Computer Geek in July 2021. We were in desperate need of help . . . [MORE].
Just to say thank you for all the hard work. I can't express enough how great it's been to send proj . . . [MORE].
I would certainly like to recommend that anyone pursing maintenance for a website to contact The Com . . . [MORE].
Top Cybersecurity Threats
How to Conduct a Successf
The Future of E-Learning: