Cyber Threat Report: 'From South America to Southeast Asia: The Fragile Web of REF7707'

Report Author Elastic Security Labs
Publication Date 2025-02-13
Original Reporting Source
Related Intrusion Sets REF7707
Victim Sectors Ministries of Foreign Affairs

REF7707 is an advanced and persistent threat actor tracked by Elastic Security Labs. The group has been observed actively targeting the foreign ministry of a South American nation and also has links to intrusions across Southeast Asia. This campaign is characterized by custom malware families named FINALDRAFT, GUIDLOADER, and PATHLOADER, showcasing significant technical sophistication. Although attribution remains uncertain, the campaign's operational capabilities suggest a high level of expertise tempered by notable operational security missteps. The observed TTPs (tactics, techniques, and procedures) include leveraging Microsoft's `certutil` utility for downloading malicious payloads, as well as Windows Remote Management’s Remote Shell plugin (WinrsHost.exe), and the Windows-signed debugger CDB.exe. The group abuse Microsoft’s Graph API for command and control (C2) activities alongside Google's Firebase and Pastebin which were used to host payloads. In contrast to some of the more advanced techniques on show, weak operational security revealed pre-production malware samples, victim credentials, and other infrastructure components. Targeting has been concentrated on government sectors within South America and Southeast Asia, highlighting the adversary’s focus on politically and diplomatically sensitive organizations. The deployment of versatile malware such as FINALDRAFT, capable of functioning across both Windows and Linux systems, underscores the adaptability and reach of REF7707. Despite their innovative techniques, the inconsistencies in their evasion strategies and infrastructure management provide opportunities for detection and proactive defense against this campaign.

Cyber Threat Graph Context

Explore how this report relates to the wider threat graph