Description

Unknown threat actors have launched a targeted cyber espionage campaign against Indian government entities and energy companies, aiming to deploy a modified version of the HackBrowserData information stealer malware. According to EclecticIQ researcher Arda Büyükkaya, the attack, named Operation FlightNight, commenced on March 7, 2024, with phishing emails disguised as Indian Air Force invitation letters. The attackers utilized Slack channels for command and control (C2), exfiltrating sensitive information such as confidential documents, private emails, and cached browser data. The campaign successfully compromised multiple government agencies, including those involved in electronic communications, IT governance, and national defense, along with private energy firms. The attack chain initiates with a phishing email containing an ISO file ("invite.iso"), leading to the execution of a hidden binary ("scholar.exe") within the mounted disk image. Concurrently, a lure PDF presents itself as an Air Force invitation, while the malware covertly extracts and transmits data to an actor-controlled Slack channel named FlightNight. The malware, a modified version of HackBrowserData, extends beyond browser data theft to include document exfiltration and Slack communication capabilities. This adaptation allows threat actors to leverage freely available offensive tools and legitimate infrastructure like Slack to minimize detection risks and operational costs. The disclosure of these activities by Indian security researcher xelemental highlights the growing trend of threat actors exploiting open-source tools for cyber espionage. It underscores the evolving threat landscape, emphasizing the need for enhanced cybersecurity measures and awareness.