Description

Group-IB researchers Rustam Mirkasymov and Martijn van den Berk have identified a new threat actor named Boolka, which has been targeting websites with malicious scripts to deploy a modular trojan called BMANAGER since at least 2022. Boolka conducts opportunistic SQL injection attacks on websites in various countries, infecting them with JavaScript designed to intercept user data. This script sends data to a command-and-control server named "boolka[.]tk" and exfiltrates user inputs in a Base64-encoded format, capturing sensitive information like credentials. The compromised websites also redirect users to fake loading pages prompting the download of a browser extension. Instead, this action drops a downloader for the BMANAGER trojan, which fetches additional malware from a hard-coded URL. Based on the BeEF framework, BMANAGER deploys four modules: BMBACKUP (harvests files), BMHOOK (records running applications and keyboard focus), BMLOG (logs keystrokes), and BMREADER (exports stolen data). It establishes persistence through scheduled tasks and uses a local SQL database located at "C:\Users{user}\AppData\Local\Temp\coollog.db." Boolka is the third known actor, following GambleForce and ResumeLooters, to use SQL injection attacks for data theft recently. The evolution of Boolka's tactics from SQL injection to developing its own malware delivery platform and sophisticated trojans like BMANAGER highlights its increasing capabilities. The injection of malicious JavaScript and use of the BeEF framework demonstrate the progressive development of this threat actor's techniques.