Kuboid
Open Luck·Kuboid.in
Security BSides2025
Open in YouTube ↗

Tracking the World's Dumbest Cyber-Mercenaries

Security BSides San Francisco193 views25:4710 months ago

This talk details the investigation of a low-sophistication threat actor group, identified as 'Dark Caracal', which utilizes phishing and off-the-shelf malware to conduct global surveillance. The researchers demonstrate how misconfigured command-and-control (C2) infrastructure, specifically open directory indexes on Apache/XAMPP servers, allowed for the exfiltration and analysis of the attackers' own data. The presentation highlights the effectiveness of basic operational security (OPSEC) failures in enabling attribution and tracking of cyber-mercenary campaigns. The speakers also discuss the transition of these actors from desktop-based malware to mobile-focused spyware.

How Misconfigured Apache Servers Exposed a Global Spyware Operation

TLDR: A threat actor group known as Dark Caracal was caught running a global surveillance campaign using off-the-shelf malware, but their own poor operational security (OPSEC) allowed researchers to turn the tables. By failing to secure their Apache/XAMPP command-and-control (C2) directories, the attackers inadvertently exposed their entire victim database and internal logs. This case serves as a stark reminder that even sophisticated spyware campaigns often rely on fragile, misconfigured infrastructure that is ripe for discovery during reconnaissance.

Security researchers often focus on the latest zero-day exploits or complex supply chain attacks, but the most significant intelligence gains frequently come from the simplest mistakes. The investigation into the Dark Caracal group highlights a recurring reality in modern threat intelligence: attackers are just as prone to security misconfigurations as the organizations they target. When a threat actor leaves their C2 infrastructure wide open, they aren't just leaking their own data; they are providing a roadmap of their entire operation.

The Anatomy of a Self-Inflicted Breach

Dark Caracal, a group that has been active for years, primarily relies on phishing to deploy malware like Bandook. While the malware itself is a standard remote access trojan (RAT) capable of capturing keystrokes, audio, and screen data, the group’s infrastructure management was anything but standard. During their research, the team discovered that the attackers were hosting their C2 servers on Windows machines running XAMPP, a popular stack for local development.

The critical failure here was the default configuration of the Apache server. The attackers failed to disable directory indexing, which meant that anyone navigating to the root directory of their C2 server could view a complete list of files. Using Dirbuster, the researchers were able to enumerate these directories and identify exactly where the exfiltrated data was being stored.

Because the attackers were uploading victim data directly into the web root, the researchers didn't need to perform any complex exploitation. They simply browsed the directory structure to download thousands of files, including backups of entire Windows machines and logs from mobile devices. This level of access provided a granular view of the group's targeting strategy, revealing that they were not just focused on a single region but were conducting a global campaign across at least 20 countries.

From Desktop RATs to Mobile Spyware

The research also uncovered a significant shift in the group's tactics. While they initially focused on desktop-based infections, they eventually expanded into mobile spyware, which they dubbed Pallas. This mobile component was distributed by backdooring legitimate applications, including secure messaging apps like Signal and WhatsApp, as well as privacy tools like Psiphon.

The Pallas malware functions as a comprehensive surveillance tool. It can exfiltrate text messages, call logs, and even scan for nearby Wi-Fi access points to triangulate a victim's location. By analyzing the exfiltrated data, the researchers were able to map the attackers' own infrastructure. They noticed that the admin console logins were consistently originating from a specific location in downtown Beirut. By correlating this with the Wi-Fi network data collected by the malware, they successfully identified the physical building housing the attackers' operations.

Practical Reconnaissance for Pentesters

For those of us conducting penetration tests or bug bounty research, this case underscores the value of thorough infrastructure reconnaissance. When you encounter a target using common development stacks like XAMPP or standard Apache configurations, never assume the default settings have been hardened.

If you are testing an environment, always check for directory listing vulnerabilities. A simple nmap scan with the --script http-enum flag can often reveal these misconfigurations in minutes. If you find an open directory, don't just report it and move on. Take the time to understand what is being exposed. Are there configuration files, log files, or backups? These files often contain hardcoded credentials, API keys, or internal network diagrams that can be used to escalate your access.

In a real-world engagement, the impact of an open directory can be catastrophic. It is not just about the data you can see; it is about the context you can gain. By understanding how an application is structured, you can identify the most sensitive endpoints and focus your efforts where they will have the most impact.

Defensive Hardening

Defenders must treat their C2 and management infrastructure with the same level of rigor as their production systems. Disabling directory indexing is a basic step, but it is only the beginning. Ensure that all administrative interfaces are restricted to specific IP ranges or, better yet, require multi-factor authentication and VPN access.

Furthermore, regularly audit your web server configurations to ensure that no sensitive data is being stored in the web root. If you are using tools like XAMPP for testing or development, ensure they are never exposed to the public internet. The moment a development tool becomes accessible to the outside world, it becomes a potential entry point for an attacker.

The Dark Caracal investigation proves that even when attackers are effective, they are rarely perfect. Their reliance on standard, poorly configured tools created a vulnerability that allowed researchers to map their entire operation. As we continue to see the rise of sophisticated spyware, the most effective defense remains the consistent application of basic security hygiene. Keep your infrastructure locked down, audit your configurations, and never underestimate the power of a simple directory listing to reveal the inner workings of a threat actor.

Talk Type
research presentation
Difficulty
intermediate
Category
threat intel
Has Demo Has Code Tool Released


BSidesSF 2025

94 talks · 2025
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in