NG Solution Team
Technology

How is the Bitter APT exploiting a WinRAR zero-day to steal data?

A sophisticated cyberattack campaign by the South Asian threat actor Bitter, also known as APT-Q-37, has been revealed, leveraging a WinRAR zero-day vulnerability to deploy custom C# backdoors for data theft and persistent access. The campaign employs two primary infection methods: the use of malicious Excel Add-In files with VBA macros and the exploitation of a previously unknown WinRAR path traversal vulnerability.

In the first method, a file named “Nominated Officials for the Conference—xlam” is used to distribute the malware. When macros are enabled, it creates a file containing Base64-encoded C# source code, which is then compiled and installed as a payload in the system. This method ensures persistence by creating a scheduled task that connects to a domain associated with prior Bitter activities.

The second method involves a weaponized archive that overwrites Word’s default template, ensuring malware execution every time Word is launched. This method also embeds macros that connect to a server to retrieve a backdoor, indicating a shared origin with the first method.

The backdoor used by the Bitter group is highly advanced, utilizing encrypted HTTP communications to collect system information and transmit it to a command and control server. This infrastructure is linked to a domain cluster registered in April 2025, suggesting ongoing refinement of their techniques targeting high-value sectors such as government, defense, and energy.

Users are advised to update WinRAR, disable macro execution, and avoid opening unsolicited attachments to mitigate the risk.

Related posts

What Are August 2025’s Groundbreaking Tech Trends?

Emily Brown

How Are PubScholars Conferences Shaping Innovation in AI and Neurology?

Emily Brown

How has Qantas been affected by a major data breach?

James Smith

Leave a Comment

This website uses cookies to improve your experience. We assume you agree, but you can opt out if you wish. Accept More Info

Privacy & Cookies Policy