cyware.com Open in urlscan Pro
15.197.166.200  Public Scan

URL: https://cyware.com/news/blotchyquasar-rat-targets-users-in-latam-region-2c992ff1
Submission: On April 15 via manual from SV — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="form-inline" data-hs-cf-bound="true"><input type="text" placeholder="Search Topic, Events" value="" class="mr-sm-2 mr-md-0 w-100 bg-lighter border-lighter py-3 pr-5 form-control form-control-sm" id="__BVID__23">
  <a class="cursor-pointer position-absolute" style="right:35px;"><i class="icon icon-search"></i></a></form>

Text Content

 * Alerts
 * Events
 * DCR


 * 
 * Explore Cyware Products

Alerts Events DCR

Go to listing page


BLOTCHYQUASAR RAT TARGETS USERS IN LATAM REGION

 * Malware and Vulnerabilities
 * July 18, 2023
 * Cyware Alerts - Hacker News



 * 
 * 
 * 
 * 
 * 

IBM Security X-Force has dissected a new attack campaign that used BlotchyQuasar
RAT to target Latin Americans. The campaign was first detected in late April and
continued through May.




A GLANCE AT THE NEW BLOTCHYQUASAR ATTACK METHOD

Likely developed by the Hive0129 cybercriminal group, BlotchyQuasar was
distributed by a phishing email impersonating government agencies in Latin
America.
 * The email informed the recipients of their tax status and prompted them to
   click on a link within the email.
 * The link was geofenced using a link generated with the Geo Targetly service.
   Once the victim clicked on it, it caused the download of a password-protected
   archived LHA file. 
 * Upon decrypting the archive file, a .NET malware loader identified as RoboSki
   would be downloaded onto the victim’s system. 
 * This RoboSki loader ultimately led to the deployment of BlotchyQuasar RAT in
   the final stage of the infection chain.

Researchers noted that the RoboSki loader was not only used by the Hive0129
group, but was also leveraged by other low-profile threat actors to deploy
various RATs and stealers, such as AgentTesla, FormBook, or LokiBot, via
phishing emails.




ABOUT THE BLOTCHYQUASAR VERSION 

The version of BlotchyQuasar RAT used in the campaign is under active
development and has been in the wild for more than two years.
 * It targeted personal and enterprise applications used for financial
   transactions in the most popular banks in Latin America, specifically
   Colombia, Ecuador, and Bolivia. 
 * As the malware variant continued to evolve, several features were found
   overlapping with a malware called ProyectoRAT, reported in 2019, targeting
   users in Latin America
 * The most recent addition included the Google Chrome Kiosk feature, which was
   likely added earlier this year.





LATAM IN THE FOCUS

The BlotchyQuasar campaign comes days after a similar phishing campaign was
observed targeting users in the LATAM region. Criminals used the TOITOIN trojan
which was meant to collect system information and extract data from popular web
browsers, including Google Chrome, Microsoft Edge, Internet Explorer, Mozilla
Firefox, and Opera from LATAM users.




CONCLUSION

X-Force researchers assess that Hive0129 threat actors will likely continue to
enhance their tools and launch more phishing operations within the LATAM region.
As suggested by security researchers, IOCs associated with the attack campaign
will help organizations in eliminating or blocking the threat.
 * BlotchyQuasar RAT
 * LATAM
 * RoboSki loader
 * Hive0129
 * ProyectoRAT



Publisher


CYWARE



Previous

GAMAREDON APT STEALS DATA WITHIN AN HOUR

Breaches and Incidents



Next

TEAMTNT STEALS TO AZURE AND GOOGLE CLOUD CREDENTIALS

Breaches and Incidents

--------------------------------------------------------------------------------

CATEGORIES

Expert Blogs and Opinion
Innovation and Research
The Hacker Tools
Incident Response, Learnings
Malware and Vulnerabilities
Breaches and Incidents
Laws, Policy, Regulations
Companies to Watch
Trends, Reports, Analysis
Strategy and Planning
Mobile Security
Govt., Critical Infrastructure
Identity Theft, Fraud, Scams
Security Culture
New Cyber Technologies
Major Events
Cyber Glossary
Threat Actors
Security Products & Services
Threat Intel & Info Sharing
Emerging Threats
Geopolitical, Terrorism
Internet-of-Things
Computer, Internet Security
Social Media Threats
Security Tips and Advice
Interesting Tweets
Marketplace
Did You Know?
Physical Security

RESOURCES

Cyber Fusion Center Guide

EVENTS

Conference
Webinar
Summit
Course
Symposium
Talk
Seminar
Others

--------------------------------------------------------------------------------

News and Updates, Hacker News

Get in touch with us now!

1-855-692-9927

--------------------------------------------------------------------------------

Download Cyware Social App



Terms of Use Privacy Policy © 2023