Blind Eagle Exploits Proton66 Hosting for Phishing and RAT Operations Targeting Colombian Banks

June 30, 2025
Cybercrime / Vulnerability

The cybercriminal group known as Blind Eagle has been definitively linked to the Russian bulletproof hosting service Proton66. Trustwave SpiderLabs reported last week that they established this connection through digital assets associated with Proton66, unveiling an active threat cluster that utilizes Visual Basic Script (VBS) files as its entry point and deploys ready-made remote access trojans (RATs). While VBS may appear outdated, it remains a favored choice among threat actors. They often utilize bulletproof hosting providers like Proton66, which disregard abuse reports and legal requests for takedowns. This tolerance allows attackers to operate phishing websites, command-and-control servers, and malware delivery systems seamlessly. Trustwave identified a series of domains with similar naming conventions (e.g., gfast.duckdns[.]org, njfast.duckdns[.]org) starting in…

Blind Eagle Exploits Proton66 Hosting for Cyber Attacks on Colombian Banks

June 30, 2025
Cybersecurity Update

A recent report by Trustwave SpiderLabs has traced the activities of the cyber threat group known as Blind Eagle, attributing their operations with high confidence to the Russian hosting service Proton66. This analysis arose from investigations into digital assets associated with Proton66, leading experts to uncover an active threat cluster that employs Visual Basic Script (VBS) files as an initial attack vector and utilizes readily available remote access trojans (RATs) for further exploitation.

Despite the perception that VBS is an outdated technology, it remains a favored method for cybercriminals. The simplicity with which these scripts can be bundled into phishing emails poses a significant risk to unsuspecting targets. The bulletproof nature of hosting services like Proton66 is particularly appealing to malicious actors, as these providers are known for overlooking abuse reports and ignoring legal takedown requests. This operational leniency allows criminals to establish and maintain phishing sites, command-and-control servers, and malware distribution networks with relative ease.

Trustwave’s investigation focused on a series of domains exhibiting a consistent naming pattern, including examples like gfast.duckdns[.]org and njfast.duckdns[.]org, which are indicative of the infrastructure utilized by Blind Eagle. The identified domains serve as a crucial part of the cybercriminals’ strategy, providing a foundation for their malicious endeavors against financial institutions.

The primary targets of Blind Eagle’s cyber campaigns appear to be banks located in Colombia, underscoring a focused effort to exploit the financial system within the region. As these banks are essential to the local economy, the implications of such attacks are far-reaching, not only compromising sensitive customer data but also potentially destabilizing trust in the banking system.

The tactics employed by Blind Eagle can be mapped to several techniques outlined in the MITRE ATT&CK framework. Initial access likely occurs through phishing attempts utilizing crafted VBS files. Persistence may be established through the deployment of RATs, allowing attackers to maintain control over compromised systems. Furthermore, privilege escalation may come into play as the attackers seek to expand their access within the network, thereby enhancing their ability to exfiltrate data and execute their malicious plans.

As businesses continue to face the evolving landscape of cyber threats, the case of Blind Eagle illustrates the importance of robust security measures. Understanding the tactics and techniques employed by such adversaries is vital for developing effective defenses against similar attacks. Cybersecurity vigilance remains paramount for organizations, especially those within the financial sector, as they navigate the complex interplay of technology and security in an increasingly digital world.

Source link