Hackers Hit Indian Defense, Energy Sectors with Malware Posing as Air Force Invite

Teilen:

Indian government entities and energy companies have been targeted by unknown threat actors with an aim to deliver a modified version of an open-source information stealer malware called HackBrowserData and exfiltrate sensitive information in some cases by using Slack as command-and-control (C2).

“The information stealer was delivered via a phishing email, masquerading as an invitation letter from the Indian Air Force,” EclecticIQ researcher Arda Büyükkaya said in a report published today.

“The attacker utilized Slack channels as exfiltration points to upload confidential internal documents, private email messages, and cached web browser data after the malware’s execution.”

The campaign, observed by the Dutch cybersecurity firm beginning March 7, 2024, has been codenamed Operation FlightNight in reference to the Slack channels operated by the adversary.

Targets of the malicious activity span multiple government entities in India, counting those related to electronic communications, IT governance, and national defense.

The threat actor is said to have successfully compromised private energy companies, harvesting financial documents, personal details of employees, details about drilling activities in oil and gas. In all, about 8.81 GB of data has been exfiltrated over the course of the campaign.

op

The attack chain starts with a phishing message containing an ISO file (“invite.iso”), which, in turn, contains a Windows shortcut (LNK) that triggers the execution of a hidden binary (“scholar.exe”) present within the mounted optical disk image.

Simultaneously, a lure PDF file that purports to be an invitation letter from the Indian Air Force is displayed to the victim while the malware clandestinely harvests documents and cached web browser data and transmits them to an actor-controlled Slack channel named FlightNight.

The malware is an altered version of HackBrowserData that goes beyond its browser data theft features to incorporate capabilities to siphon documents (Microsoft Office, PDFs, and SQL database files), communicate over Slack, and better evade detection using obfuscation techniques.

It’s suspected that the threat actor stole the decoy PDF during a previous intrusion, with behavioral similarities traced back to a phishing campaign targeting the Indian Air Force with a Go-based stealer called GoStealer.

Details of the activity were disclosed by an Indian security researcher who goes by the alias xelemental (@ElementalX2) in mid-January 2024.

The GoStealer infection sequence is virtually identical to that of FlightNight, employing procurement-themed lures (“SU-30 Aircraft Procurement.iso”) to display a decoy file while the stealer payload is deployed to exfiltrate information of interest over Slack.

By adapting freely available offensive tools and repurposing legitimate infrastructure such as Slack that’s prevalent in enterprise environments, it allows threat actors to reduce time and development costs, as well as easily fly under the radar.

flow
Image source: ElementalX2

The efficiency benefits also mean that it’s that much easier to launch a targeted attack, even allowing less-skilled and aspiring cybercriminals to spring into action and inflict significant damage to organizations.

“Operation FlightNight and the GoStealer campaign highlight a simple yet effective approach by threat actors to use open-source tools for cyber espionage,” Büyükkaya said.

“This underscores the evolving landscape of cyber threats, wherein actors abuse widely used open-source offensive tools and platforms to achieve their objectives with minimal risk of detection and investment.”

Ravie Lakshmanan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:30 pm, Juni 24, 2025
Wetter-Symbol 23°C
L: 22° | H: 25°
aufgelockerte Bewölkung
Luftfeuchtigkeit: 65 %
Druck: 1011 mb
Wind: 12 mph SW
Windböe: 24 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 40%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:43 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
22° | 25°°C 0 mm 0% 9 mph 66 % 1011 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
17° | 29°°C 0 mm 0% 10 mph 87 % 1013 mb 0 mm/h
Do. Juni 26 10:00 pm
Wetter-Symbol
17° | 25°°C 1 mm 100% 15 mph 79 % 1018 mb 0 mm/h
Fr. Juni 27 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 14 mph 65 % 1022 mb 0 mm/h
Sa. Juni 28 10:00 pm
Wetter-Symbol
17° | 29°°C 0 mm 0% 11 mph 80 % 1024 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
21° | 23°°C 0 mm 0% 9 mph 66 % 1011 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
18° | 20°°C 0 mm 0% 8 mph 73 % 1012 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 87 % 1012 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
17° | 17°°C 0 mm 0% 7 mph 82 % 1012 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
24° | 24°°C 0 mm 0% 6 mph 57 % 1013 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
26° | 26°°C 0 mm 0% 6 mph 38 % 1012 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
29° | 29°°C 0 mm 0% 10 mph 36 % 1010 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
27° | 27°°C 0 mm 0% 8 mph 39 % 1009 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€90,878.37
2.45%
Ethereum(ETH)
€2,097.87
5.76%
Fesseln(USDT)
€0.86
-0.01%
XRP(XRP)
€1.90
6.97%
Solana(SOL)
€123.76
3.48%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.141426
4.49%
Shiba Inu(SHIB)
€0.000010
4.34%
Pepe(PEPE)
€0.000009
6.70%
Nach oben scrollen