Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Hack-for-Hire Firm Connected to Attacks on Nonprofits, Journalists

The Dark Basin group behind thousands of phishing and malware attacks is likely an India-based "ethical hacking" firm that works on behalf of commercial clients.

An India-based firm whose slogan is "you desire, we do" has launched cyberattacks against thousands of individuals and organizations across the globe as part of a large commercial and government-funded espionage operation, according to the University of Toronto's CitizenLab, a multiorganizational research team.

The hack-for-hire operation, dubbed "Dark Basin" by CitizenLab, targeted nonprofit organizations and advocacy groups, such as climate advocacy groups and net-neutrality campaigns, as well as commercial targets, such as financial firms and pharmaceutical companies. One specific target: a large cluster of individuals and organizations — including the Center for International Environmental Law, Climate Investigations Center, Greenpeace, and the Union of Concerned Scientists — collaborating on the #ExxonKnew campaign, which focused on uncovering what ExxonMobil had discovered and kept secret about the impact of climate change.

"Over the course of our multi-year investigation, we found that Dark Basin likely conducted commercial espionage on behalf of their clients against opponents involved in high profile public events, criminal cases, financial transactions, news stories, and advocacy," the CitizenLab researchers stated in a blog post. "In addition to the targeting of civil society, we found that journalists from multiple major US media outlets were also targeted."

The brazen targeting of civilian groups and nonprofit organizations by what appears to be commercial clients highlights the growing acceptance of hack-for-hire cyber operations as an under-the-table business tactic. In the report, the CitizenLab researchers pointed to previous court cases and documents that indicated similar operations have provided evidence in legal disputes, often at the behest of law firms and private investigators.

In late May, Google noted that hack-for-hire operations had taken off in India and had specifically targeted businesses and individuals by disguising phishing attempts as notifications from the World Health Organization. 

"The accounts have largely targeted business leaders in financial services, consulting, and healthcare corporations within numerous countries including the U.S., Slovenia, Canada, India, Bahrain, Cyprus, and the UK," Google stated in its advisory. "The sites typically feature fake login pages that prompt potential victims to give up their Google account credentials, and occasionally encourage individuals to give up other personal information, such as their phone numbers."

In the most recent case, the company behind the operation appears to be BellTrox InfoTech Services, a conclusion that CitizenLab researchers made with "high confidence." Calling the targeting of individuals and groups exercising their first amendment rights as "exceptionally troubling," the researchers called out the firm but could not connect the actions with any specific company that may have been a client of the firm.

"Many of Dark Basin's targets have a strong but unconfirmed sense that the targeting is linked to a dispute or conflict with a particular party whom they know," the researchers stated in the report. "However, absent a systematic investigation, it is difficult for most individuals to determine with certainty who undertakes these phishing campaigns and/or who may be contracting for such services, especially given that Dark Basin's employees or executives are unlikely to be within the jurisdiction of their local law enforcement."

The Dark Basin group made a fundamental error that has also plagued legitimate web applications: using sequential numbers as part of the URLs sent to victims, which allows researchers to get an idea of the true scope of the attacks by enumerating every URL. The CitizenLab researchers tracked 28 custom URL-shortening services created by BellTrox using an open source project called Phurl. The investigation allowed the researchers to uncover nearly 28,000 shortened URLs sent to targets. In many cases, the e-mail address was included in the URL.

"This campaign operated at a scale we had not previously detected in our research into targeted intrusion operations—versus generic phishing operations," the CitizenLab researchers wrote, adding that "we concluded that Dark Basin's deceptions, while individually not always effective, did achieve some account access in part because the group could be extremely persistent."

The CitizenLab group ended the report with a warning.

"The rise of large-scale, commercialized hacking threatens civil society," the researchers said. "As this report shows, it can be used as a tool of the powerful to target organizations that may not have sophisticated cybersecurity resources and consequently are vulnerable to such attacks. ... We believe it is especially urgent that all parties involved in these phishing campaigns are held fully accountable."

At the request of several of the targets, the researchers have provided materials and indicators of compromise to the US Department of Justice.

Related Content:


Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register
Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Hacking Yourself: Marie Moe and Pacemaker Security
Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
Startup Aims to Map and Track All the IT and Security Things
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-09-24
The client API authentication mechanism in Pexip Infinity before 10 allows remote attackers to gain privileges via a crafted request.
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
PUBLISHED: 2020-09-24
An incomplete SSL server certification validation vulnerability in the Trend Micro Security 2019 (v15) consumer family of products could allow an attacker to combine this vulnerability with another attack to trick an affected client into downloading a malicious update instead of the expected one. CW...
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. x86 PV guest kernels can experience denial of service via SYSENTER. The SYSENTER instruction leaves various state sanitization activities to software. One of Xen's sanitization paths injects a #GP fault, and incorrectly delivers it twice to the guest. T...
PUBLISHED: 2020-09-23
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life time of a guest. Howeve...