How Is Blind Eagle Exploiting NTLM Flaws to Attack Colombian Institutions?

Article Highlights
Off On

Blind Eagle, a notorious threat actor operating since at least 2018, is leveraging NTLM flaws to launch sophisticated cyber attacks against Colombian institutions, creating unprecedented challenges for these entities. Also known as AguilaCiega, APT-C-36, and APT-Q-98, this cybercriminal group has focused its efforts on South American countries, primarily Colombia and Ecuador. The group’s campaigns have been monitored closely since November 2024, with a significant infection rate, particularly targeting Colombian judicial institutions and other governmental or private organizations. One particular campaign, around December 19, 2024, resulted in over 1,600 victims, highlighting the effectiveness of Blind Eagle’s malicious operations.

Attack Methods and Tools Used by Blind Eagle

Blind Eagle’s attack methodologies are sophisticated and multifaceted, relying heavily on spear-phishing emails to gain initial access to their targets. These emails often carry payloads designed to deploy remote access trojans (RATs) such as AsyncRAT, NjRAT, Quasar RAT, and Remcos RAT. The attackers have also showcased their technical prowess by exploiting a variant of a now-patched Microsoft Windows vulnerability (CVE-2024-43451). This NTLMv2 hash disclosure vulnerability allows Blind Eagle to detect when a malicious .URL is downloaded and executed, even on systems that have been patched against the flaw. Their rapid adaptation to security patches demonstrates their capacity to stay ahead of conventional defense mechanisms.

Moreover, Blind Eagle utilizes packer-as-a-service (PaaS) tools like HeartCrypt, which help them obfuscate their malicious code and evade detection. By distributing their payloads via platforms such as Bitbucket and GitHub, they manage to bypass traditional security measures. This tactic signifies a shift from more conventional platforms like Google Drive and Dropbox, highlighting their ability to evolve and adapt their strategies. Such means not only make their attacks harder to detect but also enable them to maintain persistent access within the compromised networks.

Data Compromise and Operational Insights

Blind Eagle’s ability to compromise data effectively is evident from an analysis of a GitHub repository they utilized during their campaigns. This repository revealed a lot about their operational tactics, including clues that align their activities with the UTC-5 time zone, corresponding to South American regions. Within this repository were sensitive details, such as account-password pairs for 1,634 unique email addresses, providing significant insights into the breadth of their compromise. The data unearthed included usernames, passwords, email credentials, and even ATM PINs, closely tying the incidents to various Colombian entities.

These operational slip-ups, while rare, exposed critical information about Blind Eagle’s infiltration techniques. The strategic use of legitimate file-sharing platforms such as Google Drive, Dropbox, Bitbucket, and GitHub for malware deployment allows Blind Eagle to blend in seamlessly with everyday network traffic. By leveraging these widespread services, they effectively bypass conventional cybersecurity defenses and remain undetected for extended periods. Their use of advanced crimeware tools like Remcos RAT, HeartCrypt, and PureCrypter points to deep connections within the cybercriminal ecosystem, which provides them with cutting-edge evasion strategies and long-term access to compromised networks.

Strategic Implications and Future Considerations

Blind Eagle, also known as AguilaCiega, APT-C-36, and APT-Q-98, has been an active threat actor since at least 2018. This cybercriminal group targets flaws in NTLM to execute sophisticated cyber attacks, posing major challenges for Colombian institutions. Their malicious efforts extend primarily to South American nations, particularly Colombia and Ecuador. Since November 2024, Blind Eagle’s campaigns have been under close watch, revealing a substantial infection rate affecting Colombian judicial bodies and other governmental or private sectors. One notable campaign around December 19, 2024, affected over 1,600 victims, showcasing the group’s effective and harmful operations. The group’s advanced tactics and targeted approach pose a significant risk, and authorities are continuously striving to combat the cyber threats posed by Blind Eagle. The impact of these attacks has been profound, highlighting the need for enhanced cyber defense measures in the region to protect against such persistent threats.

Explore more

Hotels Must Rethink Recruitment to Attract Top Talent

With decades of experience guiding organizations through technological and cultural transformations, HRTech expert Ling-Yi Tsai has become a vital voice in the conversation around modern talent strategy. Specializing in the integration of analytics and technology across the entire employee lifecycle, she offers a sharp, data-driven perspective on why the hospitality industry’s traditional recruitment models are failing and what it takes

Trend Analysis: AI Disruption in Hiring

In a profound paradox of the modern era, the very artificial intelligence designed to connect and streamline our world is now systematically eroding the foundational trust of the hiring process. The advent of powerful generative AI has rendered traditional application materials, such as resumes and cover letters, into increasingly unreliable artifacts, compelling a fundamental and costly overhaul of recruitment methodologies.

Is AI Sparking a Hiring Race to the Bottom?

Submitting over 900 job applications only to face a wall of algorithmic silence has become an unsettlingly common narrative in the modern professional’s quest for employment. This staggering volume, once a sign of extreme dedication, now highlights a fundamental shift in the hiring landscape. The proliferation of Artificial Intelligence in recruitment, designed to streamline and simplify the process, has instead

Is Intel About to Reclaim the Laptop Crown?

A recently surfaced benchmark report has sent tremors through the tech industry, suggesting the long-established narrative of AMD’s mobile CPU dominance might be on the verge of a dramatic rewrite. For several product generations, the market has followed a predictable script: AMD’s Ryzen processors set the bar for performance and efficiency, while Intel worked diligently to close the gap. Now,

Trend Analysis: Hybrid Chiplet Processors

The long-reigning era of the monolithic chip, where a processor’s entire identity was etched into a single piece of silicon, is definitively drawing to a close, making way for a future built on modular, interconnected components. This fundamental shift toward hybrid chiplet technology represents more than just a new design philosophy; it is the industry’s strategic answer to the slowing