CybersecurityBlackmoon Malware Targets Indian Users in Tax-Themed Phishing Scam

Blackmoon Malware Targets Indian Users in Tax-Themed Phishing Scam

Key Takeaways

  • Cybersecurity researchers have discovered an ongoing campaign targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign.
  • The campaign involves phishing emails impersonating the Income Tax Department of India to trick victims into downloading a malicious archive.
  • The end goal of the attack is to deploy a variant of the Blackmoon banking trojan and a legitimate enterprise tool called SyncFuture TSM for continuous monitoring and data exfiltration.
  • The campaign has not been attributed to any known threat actor or group, but demonstrates sophisticated techniques such as anti-analysis, privilege escalation, and security-software evasion.

Introduction to the Campaign
The eSentire Threat Response Unit (TRU) has uncovered an ongoing campaign that is targeting Indian users with a multi-stage backdoor as part of a suspected cyber espionage campaign. The campaign involves using phishing emails that impersonate the Income Tax Department of India to trick victims into downloading a malicious archive. This archive ultimately grants the threat actors persistent access to the victims’ machines for continuous monitoring and data exfiltration. The campaign is particularly sophisticated, using a range of techniques to evade detection and maintain control over the compromised environment.

The Attack Vector
The attack begins with a phishing email that appears to be from the Income Tax Department of India. The email contains a ZIP file that is distributed through fake tax penalty notices. The ZIP file contains five different files, all of which are hidden except for an executable called "Inspection Document Review.exe". This executable is used to sideload a malicious DLL present in the archive, which implements checks to detect debugger-induced delays and contacts an external server to fetch the next-stage payload. The downloaded shellcode then uses a COM-based technique to bypass the User Account Control (UAC) prompt to gain administrative privileges.

Evasion Techniques
The malware uses a range of evasion techniques to avoid detection. For example, it modifies its own Process Environment Block (PEB) to masquerade as the legitimate Windows "explorer.exe" process, allowing it to fly under the radar. It also retrieves the next stage "180.exe" from the "eaxwwyr[.]cn" domain, a 32-bit Inno Setup installer that adjusts its behavior based on whether the Avast Free Antivirus process ("AvastUI.exe") is running on the compromised host. If Avast is detected, the malware uses automated mouse simulation to navigate Avast’s interface and add malicious files to its exclusion list without disabling the antivirus engine. This is achieved by means of a DLL that is assessed to be a variant of the Blackmoon malware family.

The Payload
The payload of the attack is a variant of the Blackmoon banking trojan, as well as a legitimate enterprise tool called SyncFuture TSM. SyncFuture TSM is a commercial tool with remote monitoring and management (RMM) capabilities, which is repurposed in this campaign as a powerful, all-in-one espionage framework. By deploying this system as their final payload, the threat actors establish resilient persistence and gain a rich feature set to monitor victim activity and centrally manage the theft of sensitive information. The file added to the exclusion list is an executable named "Setup.exe", which is a utility from SyncFutureTec Company Limited and is designed to write "mysetup.exe" to disk. The latter is assessed to be SyncFuture TSM.

The Impact
The impact of this campaign is significant. By abusing a legitimate offering, the threat actors behind the campaign gain the ability to remotely control infected endpoints, record user activities, and exfiltrate data of interest. The campaign also involves the deployment of other files, including batch scripts that create custom directories and modify their Access Control Lists (ACLs) to grant permissions to all users. Additionally, batch scripts manipulate user permissions on Desktop folders, and a batch script performs cleanup and restoration operations. An executable called "MANC.exe" orchestrates different services and enables extensive logging, providing the threat actors with the tools to not only steal data but to maintain granular control over the compromised environment.

Conclusion
In conclusion, the campaign discovered by eSentire demonstrates a high level of sophistication and intent. The threat actors have used a range of techniques to evade detection and maintain control over the compromised environment, including anti-analysis, privilege escalation, DLL sideloading, commercial-tool repurposing, and security-software evasion. The use of a legitimate enterprise tool such as SyncFuture TSM as part of the payload highlights the need for organizations to be aware of the potential risks associated with the use of commercial software. As the campaign continues to evolve, it is likely that we will see further developments in the use of sophisticated techniques to evade detection and maintain control over compromised environments.

- Advertisement -spot_img

More From UrbanEdge

Fake Job Recruiters’ Malware in Developer Coding Challenges

Cybercriminals are exploiting developer job hunts by embedding malware in coding challenges. These attacks are effective as they leverage routine aspects of the developer workflow. Fake recruiters promise unrealistic salaries while embedding malicious code, making vigilance crucial for job-seekers in the tech industry...

Business Data, Emails & Browsing History Theft by Malicious Chrome Extensions

Cybercriminals exploit Chrome extensions to access confidential business data, emails, and browsing history from millions of users. These malicious tools often disguise themselves as legitimate productivity extensions, putting unsuspecting users at risk. Discover how to identify threats and protect your sensitive information from stealthy cyber intrusions...

Valentine’s Day Cyber Threats & Risks: Protect Yourself

Valentine's Day creates a perfect storm for cybercriminals, with romance scams accounting for $697 million in losses and phishing attempts spiking by 28%. Protect yourself by employing security measures like two-factor authentication and understanding swift actions post-scam to minimize risk and financial damage...

PlayStation 2026 State of Play Games Reveals & Announcements

PlayStation's 2026 State of Play unveiled over 15 new titles, including a surprise God of War spin-off and a remake of the original trilogy. Fans thrilled over the John Wick game reveal featuring Keanu Reeves, with new IPs and third-party revivals like Castlevania also showcased...

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...

Queensland Flood Warning, Alerts & Weekend Forecast

Queensland braces for heavy rain and potential flooding as a low-pressure trough stalls over the state. With predicted rainfall of 100-300mm through Sunday, authorities urge preparedness. SE regions may face disruptions, extending the alert to northeast New South Wales. Prepare emergency kits and plans now...

Brisbane Flood Risk: Storms Predicted to End Heatwave

Brisbane residents brace for storms set to end the relentless heatwave. Expect heavy rainfall, with up to 150mm in some areas, increasing flood risks, especially in low-lying regions. Flash floods are possible, and temperatures could drop by 10 degrees. Prepare emergency kits and stay updated on weather developments...

Apple Zero-Day Fix: Sophisticated Attack Solution & Patch

Apple has urgently patched two zero-day vulnerabilities in WebKit used in highly complex attacks targeting specific individuals. Security experts emphasize immediate updates to protect against these threats, linked to advanced actors, possibly nation-states. The overlapping nature of these exploits suggests a coordinated effort...

Windows 11 Notepad Vulnerability: Silent File Execution via Markdown Links

A critical vulnerability in Windows 11 Notepad's Markdown feature allows remote code execution via malicious links, posing a serious risk to users. Microsoft has issued a patch, but immediate updates and extra defenses are essential to prevent exploitation and ensure secure computing environments...
- Advertisement -spot_img