
The danger actor referred to as Blind Eagle has been related to a chain of ongoing campaigns concentrated on Colombian establishments and govt entities since November 2024.
“The monitored campaigns centered Colombian judicial establishments and different govt or personal organizations, with top an infection charges,” Take a look at Level stated in a brand new research.
“Greater than 1,600 sufferers had been affected all through this type of campaigns which happened round December 19, 2024. This an infection charge is essential bearing in mind Blind Eagle’s centered APT way.”
Blind Eagle, energetic since a minimum of 2018, could also be tracked as AguilaCiega, APT-C-36, and APT-Q-98. It is recognized for its hyper-specific concentrated on of entities in South The united states, in particular Colombia and Ecuador.

Assault chains orchestrated by way of the danger actor entail using social engineering techniques, steadily within the type of spear-phishing emails, to realize preliminary get admission to to focus on methods and in the end drop readily to be had faraway get admission to trojans like AsyncRAT, NjRAT, Quasar RAT, and Remcos RAT.
The most recent set of intrusions are notable for 3 causes: Using a variant of an exploit for a now-patched Microsoft Home windows flaw (CVE-2024-43451), the adoption of a nascent packer-as-a-service (PaaS) referred to as HeartCrypt, and the distribution of payloads by way of Bitbucket and GitHub, going past Google Pressure and Dropbox.
In particular, HeartCrypt is used to give protection to the malicious executable, a variant of PureCrypter that is then accountable for launching the Remcos RAT malware hosted on a now-removed Bitbucket or GitHub repository.
CVE-2024-43451 refers to an NTLMv2 hash disclosure vulnerability that was once mounted by way of Microsoft in November 2024. Blind Eagle, consistent with Take a look at Level, included a variant of this exploit into its assault arsenal an insignificant six days after the discharge of the patch, inflicting unsuspecting sufferers to advance the an infection when a malicious .URL disbursed by way of a phishing e-mail is manually clicked.

“Whilst this variant does no longer in truth disclose the NTLMv2 hash, it notifies the danger actors that the dossier was once downloaded by way of the similar bizarre user-file interactions,” the cybersecurity corporate stated.
“On units liable to CVE-2024-43451, a WebDAV request is induced even ahead of the person manually interacts with the dossier with the similar bizarre conduct. In the meantime, on each patched and unpatched methods, manually clicking the malicious .URL dossier initiates the obtain and execution of the next-stage payload.”
Take a look at Level identified that the “speedy reaction” serves to focus on the gang’s technical experience and its skill to evolve and pursue new assault strategies within the face of evolving safety defenses.
Serving as a smoking gun for the danger actor’s origins is the GitHub repository, which has printed that the danger actor operates within the UTC-5 timezone, aligning with a number of South American nations.

That isn’t all. In what seems to be an operational error, an research of the repository dedicate historical past has exposed a dossier containing account-password pairs with 1,634 distinctive e-mail addresses.
Whilst the HTML dossier, named “Ver Datos del Formulario.html,” was once deleted from the repository on February 25, 2025, it’s been discovered to comprise main points reminiscent of usernames, passwords, e-mail, e-mail passwords, and ATM PINs related to people, govt companies, instructional establishments, and companies running in Colombia.
“A key think about its luck is its skill to take advantage of reliable file-sharing platforms, together with Google Pressure, Dropbox, Bitbucket, and GitHub, permitting it to avoid conventional safety features and distribute malware stealthily,” Take a look at Level stated.
“Moreover, its use of underground crimeware equipment reminiscent of Remcos RAT, HeartCrypt, and PureCrypter reinforces its deep ties to the cybercriminal ecosystem, granting get admission to to stylish evasion ways and protracted get admission to strategies.”