newstrooper newstrooper
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Reading: Researchers detail the evolving tactics of bitter apt as its geographical extent expands
Share

News Trooper

Your Global Insight, Delivered Daily.

Search
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
Follow US
© 2025 All Rights Reserved | Powered by News Trooper News
News Trooper > Technology > Researchers detail the evolving tactics of bitter apt as its geographical extent expands
Technology

Researchers detail the evolving tactics of bitter apt as its geographical extent expands

June 6, 2025 5 Min Read
Share
Researchers detail the evolving tactics of bitter apt as its geographical extent expands
SHARE

The threat actor known as Bitter is rated as a state support hacking group tasked with collecting intelligence consistent with the interests of the Indian government.

This is based on new surveys published jointly by Proofpoint and Threatray in a thorough, two-part analysis.

“These diverse toolsets demonstrate consistent coding patterns across the malware family, particularly in system information collection and string obfuscation,” said researchers Abdallah Elsinbery, Jonas Wagner, Nick Atfield and Constantine Klinger.

Bitter, also known as APT-C-08, APT-Q-37, Hazy Tiger, Orange Yali, T-Papt-17, and TA397, has a history of focusing primarily on South Asian organizations, with choice invasions that are also targeting China, Saudi Arabia and South America.

In December 2024, evidence of targeting turkey threat actors using malware families such as WMRAT and Miyarat revealed, indicating a gradual geographical expansion.

The bitters say they frequently elect “a very small subset of targets,” and assaults target governments, diplomatic entities and defence organizations, allowing information gathering on foreign policy or current affairs.

Attack chains attached by the group usually utilize spear phishing emails and are sent along with messages sent from providers such as 163(.)com, 126(.)com, and Proton Mail, as well as compromised accounts related to the governments of Pakistan, Bangladesh and Madagascar.

Threat leaders have also been observed in these campaigns, pose as governments and diplomatic groups in China, Madagascar, Mauritius and South Korea to seduce recipients with attachments covered in malware that cause the deployment of malware.

Overview of Bitter infection chain

“Based on the content and decoy documents adopted, it is clear that TA397 does not disguise itself as governments in other countries, including Indian allies,” the Enterprise Security Company said.

See also  US DOJ seizes four domains that support cybercrime crypto services in global operations

“The targets of TA397 in these campaigns were Turkish and Chinese organizations in Europe, indicating that the group has knowledge and visibility into the legitimate work of Madagascar and Mauritius, and uses materials in spear lessons.”

Additionally, Bitter has been found to engage in keyboard activities in two different campaigns targeting government organizations to drop further enumerations on target hosts such as Kugelblitz and Bdarkrat, which were first documented in 2019.

It has standard remote access trojan features such as collecting system information, running shell commands, downloading files, and managing files on compromised hosts.

Bitter’s Malware Family

Some of the other known tools in that arsenal are below –

  • artradownloaderA downloader written in C++ that collects system information and downloads and executes remote files using HTTP requests.
  • KeyloggerC++ modules used in various campaigns to record keystrokes and clipboard content
  • WSCSPL Backdoorbackdoor that supports commands delivered via artradownloader, retrieve machine information, execute remote instructions, download and execute files
  • muuydownloader (also known as Zxxz), a Trojan that allows remote code execution of payloads received from remote servers
  • Almondrat.NET Trojan provides basic data collection functions and the ability to run any command to transfer files
  • orpcbackdoora backdoor that communicates with command and control (C2) servers using the RPC protocol and executes operator-issued instructions.
  • KiwistealerSteelers searching for files matching a predefined extension set are smaller than 50 MB and changed within the past year and remove them to a remote server
  • KugelblitzShellcode loader used for deployment of Havoc C2 framework

It should be noted that Orpcbackdoor comes from a Sec 404 team known to threat actors called mysterious elephants, who overlap with other Indian-lined threat clusters such as Sidewinder, Patchwork, Confucius, and Bitter.

See also  Why More Security Leaders Choose AEVs

The analysis of hands-on keyboard activity highlights “working hours schedule from Monday to Friday in India’s Standard Time Zone (IST).”. This coincides with the time when WHOIS domain registration and TLS certificate issuance occurs.

“TA397 is a threat actor focused on espionage, which is highly likely to operate on behalf of India’s intelligence reporting agency,” the researcher said. “There are clear indications that most infrastructure-related activities will occur during standard opening hours in the IST time zone.”

Share This Article
Facebook Twitter Copy Link
Previous Article Dune Awakening is a big hit as the new survival game hits almost 100k on Steam Dune Awakening is a big hit as the new survival game hits almost 100k on Steam
Next Article Stock market plunges, suffering worst day of 2025 as recession fears loom Stock market plunges, suffering worst day of 2025 as recession fears loom
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular News

Musk’s decision to limit political spending leaves some Republicans cold

Musk’s decision to limit political spending leaves some Republicans cold

Elon Musk's pledge to retreat from campaign spending -- if…

June 2, 2025
GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

GOP Rep. Bill Huizenga is preparing to run for Michigan's open Senate seat

McKinnack Island, Mich. -- Republican Rep. Bill Huizenga is preparing…

June 2, 2025
'It betrays our values': Progressives grapple with deadly shooting

'It betrays our values': Progressives grapple with deadly shooting

Progressive is tackling that two people who worked at the…

June 2, 2025
Beshear, Khanna to headline Dem mayor summit in July

Beshear, Khanna to headline Dem mayor summit in July

Two potential 2028 presidential primary candidates will descend on Cleveland…

June 2, 2025
Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

Democrats are ‘stuck in that unfortunate reality’ in debate over Biden's illness

24 hours after Sunday's announcement that former President Joe Biden…

June 2, 2025

You Might Also Like

How AI agents are transforming the education sector: See Kira Learning and Beyond
Technology

How AI agents are transforming the education sector: See Kira Learning and Beyond

11 Min Read
Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin
Technology

Pre-installed apps on ulefone, krüger, matz phones reset the device to reset apps and stole the pin

2 Min Read
APT intrusion, AI malware, zero-click exploits, browser hijacking, etc.
Technology

APT intrusion, AI malware, zero-click exploits, browser hijacking, etc.

33 Min Read
DOJ seizes 145 domains tied to the BidencashCarding Marketplace of Global Takedown
Technology

DOJ seizes 145 domains tied to the BidencashCarding Marketplace of Global Takedown

3 Min Read
newstrooper
newstrooper

Welcome to News Trooper, your reliable destination for global news that matters. In an age of information overload, we stand as a dedicated news platform committed to delivering timely, accurate, and insightful coverage of the world’s most significant events and trends.

  • Business
  • Entertainment
  • Gaming
  • Politics
  • Sports
  • Technology
  • Travel
  • World News
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • Home
  • World News
  • Politics
  • Sports
  • Entertainment
  • Business
  • Technology
  • Travel
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2025 All Rights Reserved | Powered by News Trooper News

Welcome Back!

Sign in to your account

Lost your password?