Operation Arachnophobia, targeted attacks from Pakistan

Operation Arachnophobia is a cyber espionage campaign originated in Pakistan descovered by experts from FireEye and ThreatConnect.

Researchers from FireEye and ThreatConnect recently conducted a joint investigation on a series of targeted attacks that could be linked to the Pakistan.

As explained by the experts the hacking campaign uncovered by experts is the demonstration that hackers based in Pakistan are evolving their activities form hacktivism to cyber espionage.

The experts dubbed the campaign Operation Arachnophobia, a series of attacks begun in early 2013 that seems to have involved a Pakistani security firm.

Researchers detected a custom malware family dubbed Bitterbug used to compromise victims and stole sensitive information, although the researchers haven’t identified targeted organizations, the backdoor was detected on specially crafted documents related to Indian issues.

Security experts know very well the Indian-based hackers in in the past conducted different cyber espionage operations on organization and private company in Pakistan, Operation Arachnophobia could be the response to those cyber attacks.

“It was engineered to collect standard Office documents on your desktop,” “It was very close to Operation Hangover activity… for which India was purportedly responsible.” says Rich Barger, chief intelligence officer at ThreatConnect.  

The experts discovered that bad actors behind  Operation Arachnophobia have hosted the Bitterbug malware on pilfered US virtual private server to masquerade its origins, the investigator speculated that the Pakistani hosting provider VPSNOC has leased its command and control infrastructure from a US virtual private server provider to make the attacks appear to come from the US.

“The threat actors utilized a hosting provider that is a Pakistani-based company with subleased VPS space within the U.S. for command and control (C2).” states the report.

“It’s where the malware is hosted and used for command and control,” added Rich Barger.

Another relevant discovery made by experts is that the Bitterbug backdoor used by bad actors has only been observed hosted on and communicating with two IP addresses operated by the above Pakistan-based hosting provider.

Why the experts speculated on the possible involvement of a Pakistani security firm?

Because Early variants of the BITTERBUG malware detected by the researchers included build paths containing the strings “Tranchulas” and “umairaziz27”, where Tranchulas is the name of a Pakistani security firm and Umair Aziz is one of its employees.

“The ‘Tranchulas’ name was in a string” of the malware” confirmed says Mike Oppenheim, principal threat intelligence analyst at FireEye. Tranchulas was supposedly a security company with both defensive and offensive cyber capabilities.

Once the experts revealed the details of the investigation, including their hypothesis of the involvement of the security firm, bad actors released a new variant with a modified their binary file paths to make them more generic.

Another interesting discovery of analysts is that employees at both the Pakistan VPSNOC and Tranchulas share same network of contacts on social media, despite the Pakistani security firm denied the circumstance.

“We know about Russia and China… India and Pakistan has room to grow and mature,” Barger says.

The confrontation in the fifth element of warfare, the cyberspace, is also influenced by new actors underestimated in the past which are increasing their cyber capabilities, let’s think to the Iran, the North Korea and the same Pakistan.

Analysis of current political context cannot ignores them.

further details on the Operation Arachnophobia campaign are included in the full report.

Pierluigi Paganini

(Security Affairs – Pakistan, Operation Arachnophobia)  

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

MITRE revealed that nation-state actors breached its systems via Ivanti zero-days

The MITRE Corporation revealed that a nation-state actor compromised its systems in January 2024 by…

10 hours ago

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

23 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

1 day ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

2 days ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

2 days ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

2 days ago

This website uses cookies.