MoustachedBouncer: AitM-powered surveillance via Belarus ISPs
This talk details the MoustachedBouncer and Winter Vivern cyber espionage campaigns, which utilize Adversary-in-the-Middle (AitM) techniques to compromise foreign diplomats in Belarus. The attackers leverage ISP-level traffic interception to inject malicious payloads and exfiltrate data, often masquerading as legitimate software updates. The research highlights the use of modular backdoors like 'Disco' and 'NightClub' to maintain persistence and conduct surveillance. The presentation concludes with defensive recommendations, including the use of end-to-end encrypted VPNs and strict network segmentation to mitigate such sophisticated, state-aligned threats.
How State-Aligned Actors Use ISP-Level AitM to Bypass Authentication
TLDR: Researchers at ESET recently uncovered the MoustachedBouncer campaign, a sophisticated espionage operation targeting foreign diplomats in Belarus via ISP-level Adversary-in-the-Middle (AitM) attacks. By intercepting traffic at the ISP, attackers inject malicious payloads that masquerade as legitimate software updates, effectively bypassing standard security controls. This research serves as a critical reminder that when an adversary controls the network path, traditional endpoint defenses can be rendered moot.
Security researchers often focus on the endpoint or the application layer, but the MoustachedBouncer campaign proves that the network path itself remains a primary battleground for state-aligned actors. By operating at the ISP level, these attackers do not need to compromise a target’s machine directly to initiate an infection. Instead, they manipulate the traffic flow to deliver malicious payloads, turning the target’s own update mechanisms against them.
The Mechanics of ISP-Level Interception
The core of the MoustachedBouncer operation is an AitM attack that targets specific, high-value individuals. When a target’s machine initiates a DNS request for a legitimate service, such as a captive portal check, the ISP-level device intercepts the request and provides a malicious response. This is not a simple DNS spoofing attack; it is a surgical redirection of traffic.
The attackers use this position to inject malicious HTML or redirect the user to a controlled domain that serves a fake software update. Because the traffic is intercepted before it reaches the intended destination, the user sees a seemingly legitimate request for an update. The payload, often a modular backdoor like Disco or NightClub, is then manually executed by the user, who believes they are performing a necessary system maintenance task.
Technical Deep Dive: The NightClub Backdoor
NightClub is a modular backdoor written in C++ that has been in use since at least 2014. Its primary function is to act as a file stealer, specifically targeting document formats like .doc, .docx, .xls, and .pdf. What makes NightClub particularly dangerous is its reliance on SMTP for Command and Control (C2) communication. By using the SMTP protocol, the malware blends in with standard email traffic, making it difficult for traditional network monitoring tools to flag the exfiltration.
The configuration for NightClub is encrypted using an LCG algorithm and stored in a file named Gfr45.cfg. Once decrypted, the configuration reveals the C2 email addresses and the specific file extensions the malware is programmed to exfiltrate. The following snippet illustrates how the malware handles its C2 communication:
// Simplified representation of NightClub C2 logic
if (connect_to_smtp(config.smtp_server)) {
send_email(config.control_mail, encrypted_data);
}
The use of DNS tunneling for C2 communication in other variants further demonstrates the attackers' focus on stealth. By encoding commands within DNS queries, they bypass firewalls that might otherwise block direct outbound connections to unknown IP addresses.
Real-World Applicability for Pentesters
For those of us conducting red team engagements, MoustachedBouncer highlights the necessity of testing for network-level trust assumptions. If you are performing an assessment, do not assume that the path between the client and the server is secure. During a test, consider how an attacker might leverage Adversary-in-the-Middle techniques to manipulate traffic if they have access to the local network or ISP infrastructure.
Testing for Cross-Site Scripting (XSS) in web applications is standard, but MoustachedBouncer shows how XSS can be used as a delivery vector for more complex payloads. In the case of the Winter Vivern campaign, attackers exploited CVE-2022-27926 in Zimbra to inject malicious JavaScript. This script then forced the user to submit their credentials to an attacker-controlled server. As a pentester, you should be looking for these injection points in web-based email clients and other internal-facing services.
Defensive Strategies
Mitigating these threats requires a shift toward a zero-trust architecture. Defenders must assume that the network is compromised. The most effective defense against AitM attacks is the use of end-to-end encryption that is not terminated by the ISP. Implementing VPNs that operate outside the standard network stack can prevent traffic from being intercepted and modified.
Furthermore, organizations must prioritize patching internal-facing services. The Winter Vivern campaign succeeded only because targets were running outdated versions of Zimbra. Regular vulnerability scanning and a robust patch management process are not just compliance checkboxes; they are the primary barriers against state-aligned actors who rely on known vulnerabilities to gain an initial foothold.
When you are auditing your own infrastructure, ask yourself what happens if the network path is no longer under your control. If your applications and update mechanisms rely on cleartext or easily intercepted protocols, you are already vulnerable. Investigate your traffic flows, enforce strict certificate pinning where possible, and ensure that your internal services are as hardened as your public-facing ones. The next time you see a suspicious update prompt, remember that the network might be lying to you.
CVEs
Vulnerability Classes
Tools Used
Attack Techniques
OWASP Categories
All Tags
Up Next From This Conference

Chained to Hit: Discovering New Vectors to Gain Remote and Root Access in SAP Enterprise Software

Zero-Touch-Pwn: Abusing Zoom's Zero Touch Provisioning for Remote Attacks on Desk Phones

ODDFuzz: Hunting Java Deserialization Gadget Chains via Structure-Aware Directed Greybox Fuzzing
Similar Talks

Kill List: Hacking an Assassination Site on the Dark Web

Counter Deception: Defending Yourself in a World Full of Lies

