Blind Eagle’s Cyber Shenanigans: How Outdated Scripts and Russian Hosting Are Causing a Ruckus
Blind Eagle, a cunning threat actor, swoops in using the Russian bulletproof hosting service Proton66. With outdated Visual Basic Script (VBS) as its trusty sidekick, this cybercriminal group targets South American entities, especially Colombian banks. Their phishing tactics, combined with off-the-shelf remote access trojans, make them the cyber equivalent of mischievous magpies.

Hot Take:
Who knew that Blind Eagles could become cyber ninjas? While most of us struggle with remembering passwords, this bunch is out there, making the world their phishing playground. I guess when your name is Blind Eagle, you’ve got to rely on your other senses—like a sixth sense for cyber trickery. With a dash of Russian bulletproof hosting and a sprinkle of Visual Basic sorcery, these digital daredevils are proving that, in the world of cybersecurity, old school can still be cool (and a massive headache for Colombian banks).
Key Points:
- Blind Eagle is using Russian bulletproof hosting service Proton66 for their operations.
- Visual Basic Script (VBS) is utilized as an initial attack vector to install remote access trojans (RATs).
- Dynamic DNS services like DuckDNS help obfuscate malicious activities.
- Colombian banks are primary targets for credential harvesting and data theft.
- VBS payloads use Crypters and Tools for obfuscation to avoid detection.