Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

UTA0137 (Pakistan) – Threat Actor

January 25, 2025
Reading Time: 4 mins read
in Threat Actors
UTA0137 (Pakistan) – Threat Actor

UTA0137

Location

Pakistan

Date of initial activity

2024

Suspected Attribution 

State-Sponsored Threat Group

Government Affiliation

Yes

Motivation

Cyberwarfare

Associated Tools

DISGOMOJI

Software

Linux

Overview

UTA0137, a sophisticated cyber threat actor, has emerged as a significant player in the landscape of cyber-espionage, with a pronounced focus on targeting government entities. Tracked by Volexity, this group is suspected to be based in Pakistan and has demonstrated a high level of technical proficiency and strategic intent in its operations. UTA0137 primarily leverages custom-developed malware to infiltrate and extract sensitive information from its targets, with notable activities observed against Indian governmental organizations. Their operations are characterized by the use of innovative malware techniques and a deep understanding of their target environments. The group’s malware arsenal includes the DISGOMOJI malware, a Golang-based tool that stands out due to its unique use of Discord for command and control (C2) communication. This malware employs an emoji-based protocol for issuing commands, showcasing the attacker’s creative adaptation of existing technologies to evade detection and enhance functionality. DISGOMOJI’s deployment and persistence techniques, including its use of Linux-specific exploits like DirtyPipe (CVE-2022-0847), highlight UTA0137’s capability to exploit system vulnerabilities and maintain a foothold within compromised environments. UTA0137’s activities are marked by a methodical approach to espionage, utilizing a combination of custom tools and open-source resources to achieve their objectives. The group’s focus on targeting specific government entities in India, coupled with their strategic use of Discord for operational communication, underscores a sophisticated understanding of both their technological and geopolitical landscape. This level of expertise and targeted intent reflects UTA0137’s position as a notable threat actor in the realm of cyber-espionage, capable of executing complex and highly effective attacks.

Common targets

India- Public Administration

Attack vectors

Phishing

How they operate

Initial Access and Execution
UTA0137’s approach to initial access typically involves sophisticated phishing campaigns or exploitation of vulnerabilities in public-facing applications. By crafting highly targeted phishing emails, they deceive users into downloading malicious attachments or clicking on harmful links. These phishing attempts often use social engineering tactics to exploit user trust, leading to the execution of malicious payloads. Upon successful entry, UTA0137 utilizes various command-line interfaces and scripting techniques to deploy and execute their payloads. These methods allow them to automate tasks and perform actions with minimal detection.
Persistence and Privilege Escalation
Once inside a network, UTA0137 establishes persistence through several methods, including configuring startup items and scheduled tasks. By embedding their malware in system startup processes or scheduled tasks, they ensure that their presence remains undetected and their access persists across system reboots. For privilege escalation, UTA0137 frequently exploits known vulnerabilities within the target environment. These vulnerabilities, often related to system misconfigurations or outdated software, allow them to gain elevated privileges and expand their control over the compromised systems.
Defense Evasion and Credential Access
UTA0137 employs advanced techniques to evade detection and hinder forensic analysis. This includes obfuscating files and information to make their malicious activities harder to identify and analyze. Additionally, they use anti-forensic techniques to obstruct data recovery efforts by security teams. Credential access is a critical component of their strategy. They systematically extract and exploit credentials from compromised systems using credential dumping tools. This access enables them to move laterally within the network and escalate their attacks.
Discovery, Lateral Movement, and Collection
During the discovery phase, UTA0137 conducts thorough network scans to identify valuable assets and potential targets. This network reconnaissance helps them map out the target environment and identify opportunities for lateral movement. They leverage remote services to navigate through the network, moving laterally to access additional systems and data. Once they have identified and isolated valuable data, UTA0137 stages this information, preparing it for exfiltration. This staged data is carefully managed to avoid detection and ensure it can be efficiently extracted from the target environment.
Exfiltration and Impact
The final stage of UTA0137’s operation involves data exfiltration and impact. They use their command-and-control (C2) channels to exfiltrate the staged data, employing encryption and other techniques to evade detection during the transfer process. Their impact extends beyond mere data theft; UTA0137 is known for manipulating or corrupting data to disrupt operations and cause significant damage to their targets. UTA0137’s technical expertise and methodical approach make them a formidable threat. Their use of advanced techniques across various stages of their operations underscores the need for robust, multi-layered defenses to counter their sophisticated tactics. Understanding their operational methods is crucial for organizations seeking to enhance their cybersecurity posture and protect against such advanced threats.

MITRE Tactics and Techniques

Initial Access (TA0001):
Phishing (T1566): UTA0137 may use phishing emails to deliver malicious payloads or credentials to gain initial access. Exploitation of Public-Facing Applications (T1190): Leveraging vulnerabilities in public-facing applications for initial entry.
Execution (TA0002):
Command-Line Interface (T1059): Using command-line tools and scripts to execute malicious code. Scripting (T1064): Employing scripts to automate tasks and execute payloads.
Persistence (TA0003):
Startup Items (T1547): Configuring startup items or services to ensure persistence on the target system. Scheduled Task/Job (T1053): Setting up scheduled tasks or jobs to maintain access and execute payloads at specified intervals.
Privilege Escalation (TA0004):
Exploitation for Privilege Escalation (T1068): Exploiting vulnerabilities to gain higher-level privileges.
Defense Evasion (TA0005):
Obfuscated Files or Information (T1027): Using obfuscation techniques to evade detection. Anti-Forensic Techniques (T1564): Implementing methods to avoid forensic analysis and data recovery.
Credential Access (TA0006):
Credential Dumping (T1003): Extracting credentials from compromised systems.
Discovery (TA0007):
Network Service Scanning (T1046): Scanning the network for services to identify potential targets.
Lateral Movement (TA0008):
Remote Services (T1021): Using remote services to move laterally across the network.
Collection (TA0009):
Data Staged (T1074): Staging collected data for exfiltration.
Exfiltration (TA0010):
Exfiltration Over Command and Control Channel (T1041): Using the established C2 channel for data exfiltration.
Impact (TA0040):
Data Manipulation (T1565): Manipulating or corrupting data to impact the target’s operations.  
References:
  • DISGOMOJI Malware Used to Target Indian Government
Tags: cyber espionageDISGOMOJIGolangGovernmentIndiaPakistanPhishingThreat ActorsUTA0137Volexity
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

APT36 Targets Indian Defense Linux Systems

hpingbot Botnet Uses Pastebin C2 Channel

Hackers Abuse Driver Signing For Malware

Google Removes 352 ‘IconAds’ Fraud Apps

Malicious Firefox Add Ons Steal Crypto Keys

Browser Cache Attack Bypasses Web Security

Subscribe to our newsletter

    Latest Incidents

    Ransomware Attack Causes Outage at Ingram

    Call of Duty Players Hacked on Game Pass

    RansomHub Claims Theft of Coppell City Data

    Tech Incubator IdeaLab Discloses Data Breach

    Brazil’s CIEE One Exposes 248,000 Records

    McLaughlin & Stern Discloses Data Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial