Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Mysterious Elephant APT: The Evolving Threat Targeting Governments via WhatsApp
Advertisements

A highly active and sophisticated threat actor known as Mysterious Elephant is escalating its operations, primarily targeting government and foreign affairs entities in the Asia-Pacific region. First identified in 2023, this Advanced Persistent Threat (APT) group has demonstrated continuous evolution, recently shifting its focus to exfiltrating sensitive data, including documents and archives, directly through WhatsApp communications.

The group’s lineage shows a complex history of borrowing and enhancing abandoned code from other APTs like Confucius and Origami Elephant. This resourcefulness allows them to operate with a unique and constantly updated malware arsenal.

Tactics and Custom Malware

In its latest campaigns, Mysterious Elephant has pivoted to highly targeted spear-phishing emails containing malicious documents to gain initial access. For instance, one decoy document mimicked an official invitation concerning Pakistan’s application for a UN Security Council seat. Once inside a network, the group deploys a custom toolkit instead of relying on known malware. Key components include PowerShell scripts for persistence, a C++ reverse shell named BabShell for remote control, and advanced in-memory loaders like MemLoader HidenDesk and MemLoader Edge to execute payloads while evading detection.

Focus on Data Exfiltration

The primary objective of Mysterious Elephant is data theft. The group utilizes a suite of specialized exfiltration tools to achieve this. The Stom Exfiltrator is specifically designed to locate and steal files from WhatsApp desktop application folders. Another tool, the ChromeStealer Exfiltrator, targets Google Chrome browser data like cookies and tokens, with evidence suggesting it also hunts for WhatsApp-related chat logs and authentication data. Their operations show a clear focus on nations like Pakistan, Bangladesh, and Sri Lanka, highlighting the significant and targeted threat they pose to regional stability and national security.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading