BlindEagle APT Deploys Dual Remote Access Trojans Against Colombian Government Infrastructure
Zscaler documents BlindEagle APT's attack on Colombian government using steganography and dual RAT deployment in September 2025.
Zscaler documents BlindEagle APT's attack on Colombian government using steganography and dual RAT deployment in September 2025.
Zscaler ThreatLabz has documented a sophisticated cyberattack campaign attributed to the BlindEagle advanced persistent threat group targeting a Colombian government institution. The research reveals a multi-stage infection chain that deployed both the Caminho remote access trojan and DCRat malware through steganographically concealed payloads. According to the investigation published on December 16, 2025, the attack occurred in early September 2025 and demonstrates significant operational evolution in BlindEagle's technical capabilities, particularly in its use of image-based payload concealment and dual malware deployment strategies against South American governmental entities.
BlindEagle, also tracked as APT-C-36, has maintained consistent focus on Colombian and Ecuadorian targets, operating primarily in South America against users in Spanish-speaking countries. The threat actor's targeting of a government agency under the control of the Ministry of Commerce, Industry and Tourism represents continued focus on Colombian governmental operations. The research indicates that the phishing email originated from what appears to be a compromised account within the targeted organization itself, demonstrating the attackers' ability to exploit internal trust relationships.
Zscaler's analysis identified a complex attack sequence comprising multiple distinct operational stages, each employing specific evasion and persistence mechanisms. The researchers documented the following technical progression:
The investigation yielded specific technical artifacts enabling detection and attribution. Zscaler documented the following indicators:
The JavaScript dropper utilized Spanish-language administrative terminology such as "ESCRITO JUDICIAL" and "NOTIFICACION DE ADMISION DEMANDA LABORAL ORDINARIA" in its filename. The attack chain employed Base64 encoding at multiple stages for obfuscation purposes.
The PowerShell command targeted the Internet Archive for payload hosting, specifically downloading a PNG image file from archive.org/download/optimized_msi_20250821/optimized_MSI.png. This image contained steganographically embedded content extracted through marker-based carving.
Caminho's VAI method contained Portuguese-language parameter names including "caminhovbs," "namevbs," "persitencia," "nomedoarquivo," and "extençao," reinforcing attribution to Portuguese-speaking developers. The malware downloaded AGT27.txt from Discord infrastructure at cdn.discordapp.com, utilizing the platform's content delivery network for operational security.
DCRat's configuration employed AES-256 encryption with the symmetric key "aPZ0ze9qOhazFFqspYVRZ8BW14nGuRUe". The configuration included a certificate serving dual functions: ensuring configuration integrity and enabling command-and-control server authentication. The command-and-control domain startmenuexperiencehost.ydns.eu utilized Dynamic DNS services, with resolution to Swedish IP addresses under ASN 42708 (GleSYS AB).
Through certificate-based server authentication analysis, ThreatLabz identified 24 hosts worldwide exposing certificates with matching issuer characteristics, though the researchers note that only a subset likely represents infrastructure operated by this specific threat actor due to DCRat's open-source availability.
The research highlights critical defensive challenges stemming from BlindEagle's deliberate exploitation of legitimate content delivery networks. Discord's CDN operates under trusted domain infrastructure with valid TLS certificates, passing through standard web filtering configurations deployed in enterprise and government environments. According to Zscaler's analysis, this tactic forces defenders into risk calculations between blocking legitimate collaboration platforms versus accepting potential malware delivery channels.
The technical effectiveness stems from asymmetry between CDN reputation scores in security products and actual content hosted through user-generated upload mechanisms. Organizations detecting the primary Caminho payload cannot assume complete threat eradication, as the secondary DCRat implant may remain dormant or communicate through separate infrastructure invisible to initial forensic scoping. The research emphasizes that this redundancy approach extends attacker dwell time and increases likelihood of operational objective achievement even under partial detection scenarios.
The use of compromised internal email accounts represents another significant challenge. The attack bypassed email security protocols not through technical exploitation, but through abuse of legitimate internal communication pathways where security checks are minimized for operational efficiency. This highlights the difficulty in distinguishing malicious activity from legitimate internal business communications when attackers control valid credentials.
The investigation was conducted by Zscaler ThreatLabz. The research methodology included dynamic malware execution in isolated environments, network traffic analysis of command-and-control protocols, and email metadata examination. Attribution to the BlindEagle threat actor was established through tactical overlaps including geographic targeting patterns, malware family preferences, infrastructure reuse patterns, and Spanish-language social engineering themes. The researchers assigned medium confidence to this attribution based on multiple supporting factors including victimology, infrastructure characteristics, phishing lure design, tooling preferences, and historical operational patterns.
Zscaler's documentation of BlindEagle's attack against Colombian government infrastructure demonstrates measurable advancement in the threat actor's operational tradecraft, particularly regarding steganographic evasion and redundant implant deployment. The successful compromise through internal email account abuse indicates either improved initial access capabilities or exploitation of persistent credential management gaps within regional public sector organizations. Organizations within Colombia and neighboring South American nations should treat this campaign as indicative of sustained threat actor interest in governmental operations, with reasonable expectation of continued targeting using evolved variants of the documented techniques. The dual-RAT approach combined with legitimate platform abuse suggests BlindEagle possesses sufficient resources and operational maturity to support complex, multi-stage intrusion sequences against defended targets, warranting proportional defensive investment from entities within the threat actor's established operational geography.