BlackOasis is a middle eastern threat group that has targeted prominent leadership in the United Nations, as well as Turkish bloggers, activists, journalists, consultancies, and think tanks. It has been purported that Neodymium, another threat actor, is closely aligned with BlackOasis’s malicious activity. However, the exact nature of their relationship and any overlap in threat group actors remains unknown. Once again, both BlackOasis and Neodymium are heavily targeting Turkish victims. Another threat actor group, Promethium, has also targeted many of the same Turkish victims. Promethium has demonstrated many of the same campaign characteristics as evidenced by its tactics, techniques, and procedures (TTPs). Over time, it may well be the conclusion of the threat researcher community that Promethium, Neodymium, and BlackOasis have more than a few members in common and may be the same threat group.
BlackOasis has exploited a vulnerability in the Adobe Flash Player (CVE-2017-11292). Adobe Flash Player version 27.0.0.159 (and earlier versions) has a flawed byte code verification procedure. This flaw, in turn, allows an untrusted value to be used to calculate an array index. This error can lead to type confusion such that successful exploitation could lead to arbitrary code execution. The impact is possible in most major operating systems, including Windows, Mac, Chrome OS, and Linux.
BlackOasis continues to run multiple campaigns across a broad swath of the global geography. They have targeted victims in Russia, Iraq, Afghanistan, Iran, the Netherlands, Bahrain, the United Kingdom, Nigeria, Libya, Jordan, Tunisia, Saudi Arabia, and Angola.
A more recently discovered Flash zero-day exploit is one of several zero-days that the BlackOasis group has successfully exploited over the past few years. This zero-day exploit is delivered through Microsoft Office documents attached to a spam email. The malicious Word document includes an ActiveX object which contains the Flash exploit.
BlackOasis has utilized many zero-day exploits; some of them are:
Want to learn more? Check out our FREE Bugcrowd University to sharpen your hacking skills.
Organizations the world over need your help! Join our researcher community to connect with hundreds of organization programs focused on finding their security vulnerabilities. Our vast directory includes programs for all skill levels across many industries and from around the world.
Hackers aren’t waiting, so why should you? See how Bugcrowd can quickly improve your security posture.