The Bitter APT group, also known as TA397, is actively targeting the Turkish defense sector using sophisticated spearphishing techniques. Proofpoint researchers have uncovered an attack chain utilizing RAR archives containing hidden Alternate Data Streams (ADS). These streams conceal malicious LNK files that, when executed, create scheduled tasks to download the WmRAT and MiyaRAT malware. The attack used a lure of infrastructure projects in Madagascar to entice victims to open the malicious files. The use of NTFS ADS, a feature that allows hidden data streams within files, is a key tactic employed by Bitter to conceal their malicious payloads.
This campaign highlights the group's focus on espionage, leveraging the RAT capabilities of WmRAT and MiyaRAT to collect host information, upload/download files, and take screenshots. Bitter, a suspected South Asian cyber espionage threat group, has a history of targeting entities in Asia and has been linked to other malware deployments, demonstrating their persistent and evolving threat capabilities. This latest attack campaign underscores the group's ability to adapt and utilize advanced techniques to compromise target systems. The researchers have tracked this group under various names including APT-C-08, APT-Q-37, Hazy Tiger, and Orange Yali, indicating its long history of activity.