European Foreign Ministry Hit By DoNot APT Cyber-Espionage Attack

Image by vecstock, from Unsplash

European Foreign Ministry Hit By DoNot APT Cyber-Espionage Attack

Reading time: 2 min

The hacker group DoNot APT performed a secretive cyberattack against a European foreign ministry, using fake emails and malware which demonstrated the advancement of worldwide espionage tactics.

In a rush? Here are the quick facts:

  • Attack began with a phishing email impersonating defense officials.
  • Malware disguised as a PDF was delivered via Google Drive.
  • Malware steals data and maintains access using scheduled tasks.

The cyber-espionage group DoNot APT, known as APT-C-35 or Mint Tempest, conducted a covert cyberattack against a European foreign ministry, as Trellix research shows. Since 2016, the espionage group operating from India has focused on South Asian government targets and diplomatic institutions, but now appears to be expanding into Europe.

The email, with the subject line “Italian Defence Attaché Visit to Dhaka, Bangladesh,” contained a malicious Google Drive link. Clicking the link downloaded a password-protected document but contained malware.

Once opened, the malware, disguised as a PDF, quietly installed a backdoor on the victim’s system. After gaining access, the attackers began stealing sensitive data by running tasks which refreshed the malware every 10 minutes. Since 2018, DoNot APT has used LoptikMod as its exclusive malware tool.

The researchers observed that the attackers employed a technique which embedded malicious code within binary strings, which made the malware detection more challenging. The malware steals personal system information through its encryption protocol to send it to a command-and-control server that researchers found inactive at the time of analysis, likely to evade detection.

The experts recommend that governments and organizations must enhance email protection mechanisms, monitor network activity, and implement signature-based malware blocking and employee training for phishing identification.

Did you like this article? Rate it!
I hated it I don't really like it It was ok Pretty good! Loved it!

We're thrilled you enjoyed our work!

As a valued reader, would you mind giving us a shoutout on Trustpilot? It's quick and means the world to us. Thank you for being amazing!

Rate us on Trustpilot
0 Voted by 0 users
Title
Comment
Thanks for your feedback