Cyberespionage operation Blind Eagle, also known as APT-C-36, has been using a new multi-stage attack chain to facilitate njRAT remote access trojan deployment, The Hacker News reports.
Such an attack chain involves a JavaScript downloader leveraged for Discord CDN-hosted PowerShell script execution, with the script triggering the deployment of another PowerShell script and a Windows batch file while saving a VBScript file within the Windows startup folder for persistence, according to a ThreatMon report. Execution of the VBScript code then facilitates the deployment of the batch file, which is then deobfuscated for running a PowerShell script leveraged for njRAT distribution.
"njRAT, also known as Bladabindi is a remote access tool (RAT) with user interface or trojan which allows the holder of the program to control the end-user's computer," said ThreatMon.
Blind Eagle was earlier reported by CheckPoint and BlackBerry to have used spear-phishing techniques for BitRAT and AsyncRAT malware delivery.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds