New hacker group GambleForce targets government and gambling sites in Asia Pacific using SQL injections

Group-IB, a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime, has discovered a previously unknown threat actor codenamed GambleForce (tracked under the name  EagleStrike GambleForce in Group-IB’s Threat Intelligence Platform). Group-IB’s Threat Intelligence unit can confirm that, since emerging in September 2023, the group has targeted more than 20 gambling, government, retail and travel websites in Australia, China, India, Indonesia, the Philippines, South Korea, Thailand, and Brazil. GambleForce uses a set of basic yet very effective techniques, including  SQL injections and the exploitation of vulnerable website content management systems (CMS) to steal sensitive information, such as user credentials. The name, GambleForce, was coined due to the group’s initial targets being from the gambling industry.

GambleForce’s command and control server (CnC), which was discovered by Group-IB’s Threat intelligence team, was taken down by the company’s Computer Emergency Response Team (CERT-GIB). Additionally, Group-IB has issued notifications for the identified victims.

GambleForce’s CnC was initially discovered in September 2023. The server housed the gang’s tools, such as dirsearch, redis-rogue-getshell, Tinyproxy, and sqlmap. The latter is a popular open-source pentesting tool designed to identify database servers vulnerable to SQL injections and exploit them. Threat actors inject malicious SQL code into a public facing web page, which allows them to bypass default authentication and access sensitive data.

Notably, the gang relies exclusively on publicly available open-source tools for initial access, reconnaissance, and data exfiltration. GambleForce utilized another popular pentesting framework, Cobalt Strike. The version of Cobalt Strike discovered on the gang’s server used commands in Chinese. However, this fact alone is not enough to attribute the group’s origin.

According to Group-IB Threat Intelligence experts, between September 2023 and December 2023, GambleForce targeted 24 organizations in 8 countries. The gang was able to successfully compromise 6 websites from Australia (travel), Indonesia (travel, retail), the Philippines (government), and South Korea (gambling).

Distribution of GambleForce’s targets by industries and countries

Figure 1. Distribution of GambleForce’s targets by industries and countries. Source: Group-IB Threat Intelligence

In some attacks, GambleForce stopped at the reconnaissance stage, failing to download the data. In six attacks, the threat actor managed to obtain user databases containing logins, hashed passwords, as well as lists of main tables from accessible databases. In almost all known attacks, GambleForce abused public-facing applications of victims by exploiting SQL injections. In one attack in Brazil, the attackers exploited CVE-2023-23752, a vulnerability in the Joomla CMS that allows threat actors to bypass security restrictions. In another attack, the threat actor managed to exfiltrate the data from requests submitted via the website’s contact form.

Rather than looking for specific data, the threat actor attempts to exfiltrate every possible piece of information within targeted databases, such as hashed and plain text user credentials. Group-IB’s Threat intelligence unit has not observed how GambleForce exploits the stolen information and continues tracking the group.

“Web injections are among the oldest and most popular attack vectors. And the reason being is that sometimes developers overlook the importance of input security and data validation. Insecure coding practices, incorrect database settings, and outdated software create a fertile environment for SQL injection attacks on web applications.”

Nikita Rostovcev
Nikita Rostovcev

Senior Analyst at the Advanced Persistent Threat Research Team, Group-IB

Visit Group-IB’s latest blog post to delve deeper into the group’s modus operandi, toolset, acquire the list of indicators of compromise (IOCs), and recommendations on how to defend against GambleForce.

Try Threat Intelligence by Group-IB

Defeat threats efficiently and identify attackers proactively with a revolutionary cyber threat intelligence platform

Request a demo

About Group-IB

Founded in 2003 and headquartered in Singapore, Group-IB is a leading creator of cybersecurity technologies to investigate, prevent, and fight digital crime. Combating cybercrime is in the company’s DNA, shaping its technological capabilities to defend businesses, citizens, and support law enforcement operations.

Group-IB’s Digital Crime Resistance Centers (DCRCs) are located in the Middle East, Europe, Central Asia, and Asia-Pacific to help critically analyze and promptly mitigate regional and country-specific threats. These mission-critical units help Group-IB strengthen its contribution to global cybercrime prevention and continually expand its threat-hunting capabilities.

Group-IB’s decentralized and autonomous operational structure helps it offer tailored, comprehensive support services with a high level of expertise. We map and mitigate adversaries’ tactics in each region, delivering customized cybersecurity solutions tailored to risk profiles and requirements of various industries, including retail, healthcare, gambling, financial services, manufacturing, crypto, and more.

The company’s global security leaders work in synergy with some of the industry’s most advanced technologies to offer detection and response capabilities that eliminate cyber disruptions agilely.

Group-IB’s Unified Risk Platform (URP) underpins its conviction to build a secure and trusted cyber environment by utilizing intelligence-driven technology and agile expertise that completely detects and defends against all nuances of digital crime. The platform proactively protects organizations’ critical infrastructure from sophisticated attacks while continuously analyzing potentially dangerous behavior all over their network.

The comprehensive suite includes the world’s most trusted Threat Intelligence, The most complete Fraud Protection, AI-powered Digital Risk Protection, Multi-layered protection with Managed Extended Detection and Response (XDR), All-infrastructure Business Email Protection, and External Attack Surface Management.

Furthermore, Group-IB’s full-cycle incident response and investigation capabilities have consistently elevated industry standards. This includes the 77,000+ hours of cybersecurity incident response completed by our sector-leading DFIR Laboratory, more than 1,400 successful investigations completed by the High-Tech Crime Investigations Department, and round-the-clock efforts of CERT-GIB.

Time and again, its solutions and services have been revered by leading advisory and analyst agencies such as Aite Novarica, Gartner®, Forrester, Frost & Sullivan, KuppingerCole Analysts AG, and more.

Being an active partner in global investigations, Group-IB collaborates with international law enforcement organizations such as INTERPOL, EUROPOL and AFRIPOL to create a safer cyberspace. Group-IB is also a member of the Europol European Cybercrime Centre’s (EC3) Advisory Group on Internet Security, which was created to foster closer cooperation between Europol and its leading non-law enforcement partners.