Darkish Pink APT Group Leverages TelePowerBot and KamiKakaBot in Subtle Assaults

The menace actor Slot Gacor Hari Ini referred to as Darkish Pink has been linked to 5 new assaults geared toward numerous entities in Belgium, Brunei, Indonesia, Thailand, and Vietnam between February 2022 and April 2023.

This contains academic entities, authorities companies, navy our bodies, and non-profit organizations, indicating the adversarial crew’s continued give attention to high-value targets.

Darkish Pink, additionally referred to as Saaiwc Group, is a complicated persistent menace (APT) actor believed to be of Asia-Pacific origin, with assaults concentrating on entities primarily positioned in East Asia and, to a lesser extent, in Europe.

The group employs a set of customized malware instruments similar to TelePowerBot and KamiKakaBot that present numerous capabilities to exfiltrate delicate knowledge from compromised hosts.

“The group makes use of a variety of subtle customized instruments, deploys a number of kill chains counting on spear-phishing emails,” Group-IB safety researcher Andrey Polovinkin said in a technical report shared with The Hacker Information.

“As soon as the attackers achieve entry to a goal’s community, they use superior persistence mechanisms to remain undetected and keep management over the compromised system.”

The findings additionally illustrate some key modifications to the Darkish Pink assault sequence to impede evaluation in addition to accommodate enhancements to KamiKakaBot, which executes instructions from a menace actor-controlled Telegram channel through a Telegram bot.

Dark Pink

The most recent model, notably, splits its performance into two distinct elements: One for controlling gadgets and the opposite for harvesting helpful data.

The Singapore-headquartered firm mentioned it additionally recognized a brand new GitHub account related to the account that comprises PowerShell scripts, ZIP archives, and customized malware which have been dedicated between January 9, 2023, and April 11, 2023.

Apart from utilizing Telegram for command-and-control, Darkish Pink has been noticed exfiltrating stolen knowledge over HTTP utilizing a service referred to as webhook[.]website. One other notable side is the usage of an Microsoft Excel add-in to make sure the persistence of TelePowerBot inside the contaminated host.


Zero Belief + Deception: Be taught Methods to Outsmart Attackers!

Uncover how Deception can detect superior threats, cease lateral motion, and improve your Zero Belief technique. Be a part of our insightful webinar!

Save My Seat!

“With webhook[.]website, it’s potential to arrange momentary endpoints with the intention to seize and examine incoming HTTP requests,” Polovinkin famous. “The menace actor created momentary endpoints and despatched delicate knowledge stolen from victims.”

Darkish Pink, its espionage motives however, stays shrouded in thriller. That mentioned, it is suspected that the hacking crew’s victimology footprint could possibly be broader than beforehand assumed.

The truth that the adversary has been linked to solely 13 assaults (counting the 5 new victims) since mid-2021 signifies an try to keep up a low profile for stealthiness. It is also an indication of the menace actor rigorously choosing their targets and conserving the variety of assaults at a minimal to scale back the chance of publicity.

“The truth that two assaults have been executed in 2023 signifies that Darkish Pink stays energetic and poses an ongoing threat to organizations,” Polovinkin mentioned. “Proof reveals that the cybercriminals behind these assaults hold updating their current instruments with the intention to stay undetected.”


Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.