Oops: Cyberspies Infect Themselves with their Own Malware

Oops: Cyberspies Infect Themselves with their Own Malware

After infecting themselves with their own custom remote access trojan (RAT), an Indian-linked cyber-espionage group has accidentally exposed its operations to security researchers.

The threat actor has been active since at least December 2015 and is tracked as PatchWork (aka Dropping Elephant, Chinastrats, or Quilted Tiger) due to the use of copy-pasted code.

During PatchWork’s most recent campaign, between late November to early December 2021, Malwarebytes Labs observed the threat actors using malicious RTF documents impersonating Pakistani authorities to infect targets with a new variant of the BADNEWS RAT, known as Ragnatela.

Also Read: PDPA Meaning: Know Its Big Advantages In Businesses

The Ragnatela RAT allows the threat actors to execute commands, capture screen snapshots, log keystrokes, harvest sensitive files and a list of running apps, deploy additional payloads, and upload files.

“Ironically, all the information we gathered was possible thanks to the threat actor infecting themselves with their own RAT, resulting in captured keystrokes and screenshots of their own computer and virtual machines,” Malwarebytes Labs’ Threat Intelligence Team explained.

After discovering that the PatchWork operators infected their own development systems with the RAT, the researchers were able to monitor them while using VirtualBox and VMware for testing and web development and testing on computers with dual keyboard layouts (i.e., English and Indian).

PatchWork testing the Ragnatela RAT (Malwarebytes LABS)

While observing their operations, they also gained info on targets the group compromised, including Pakistan’s Ministry of Defense and faculty members from molecular medicine and biological science departments at multiple universities such as the National Defense University of Islam Abad, the UVAS University’s Faculty of Bio-Science, the Karachi HEJ Research institute, and SHU University.

Also Read: What Is PDPA And What Are The 5 Things You Should Know About

“Thanks to data captured by the threat actor’s own malware, we were able to get a better understanding about who sits behind the keyboard,” Malwarebytes Labs added.

“The group makes use of virtual machines and VPNs to both develop, push updates and check on their victims. Patchwork, like some other East Asian APTs is not as sophisticated as their Russian and North Korean counterparts.”

PatchWork operators have previously targeted US think tanks in March 2018 in multiple spear-phishing campaigns using the same tactic of pushing malicious RTF files to compromise their victims’ systems and a QuasarRAT malware variant.

Two months earlier, in January 2018, they were observed pushing weaponized documents delivering BADNEWS malware in attacks against targets from the Indian subcontinent.

They were also behind a spear-phishing campaign targeting employees of European government organization during late May 2016.

Privacy Ninja

Recent Posts

Enhancing Website Security: The Importance of Efficient Access Controls

Importance of Efficient Access Controls that every Organisation in Singapore should take note of. Enhancing…

2 weeks ago

Prioritizing Security Measures When Launching Webpage

Prioritizing Security Measures When Launching a Webpage That Every Organisation in Singapore should take note…

2 weeks ago

The Importance of Regularly Changing Passwords for Enhanced Online Security

Importance of Regularly Changing Passwords for Enhance Online Security that every Organisation in Singapore should…

3 weeks ago

Mitigating Human Errors in Organizations: A Comprehensive Approach to Data Protection and Operational Integrity

Comprehensive Approach to Data Protection and Operational Integrity that every Organsiation in Singapore should know…

3 weeks ago

The Importance of Pre-Launch Testing in IT Systems Implementation

Here's the importance of Pre-Launch Testing in IT Systems Implementation for Organisations in Singapore. The…

4 weeks ago

Understanding Liability in IT Vendor Relationships

Understanding Liability in IT Vendor Relationships that every Organisation in Singapore should look at. Understanding…

1 month ago