# EHDevel – The story of a continuously improving advanced threat creation toolkit **[labs.bitdefender.com/2017/09/ehdevel-the-story-of-a-continuously-improving-advanced-threat-creation-toolkit/](https://labs.bitdefender.com/2017/09/ehdevel-the-story-of-a-continuously-improving-advanced-threat-creation-toolkit/)** ----- [Alexandru MAXIMCIUC](http://10.10.0.46/blog/labs/author/amaximciuc/) September 01, 2017 One product to protect all your devices, without slowing them down. [Free 90-day trial](http://10.10.0.46/media/html/consumer/new/get-your-90-day-trial-opt/index.html) ----- More than a year ago, on July 26th 2016, the Bitdefender Threat Intelligence Team came across a suspicious document called News.doc. However, unlike most potentially malicious documents that get processed in our labs, this file displayed similarities with a set of files known to have been used in separate attacks targeted at different institutions. Our technical dive into the file lead us to a sophisticated malware framework that uses a handful of novel techniques for command and control identification and communications, as well as a plugin-based architecture, a design choice increasingly being adopted among threat actor groups in the past few years. ----- Watch Video At: https://youtu.be/5mP1LqcNWmA Dubbed EHDevel, this operation continues to this date, the latest known victims reportedly being several Pakistani individuals. In their case, the threat actors have chosen different lures than the ones presented in this paper, but the modus operandi is identical. Another important discovery lies in the fact that this specialized framework that has been used to gather field intelligence for years in different shapes and forms, and our threat intelligence suggests a connection with the 2013 Operation Hangover APT as well. Our technical dive into the framework revealed an intricate mix of transitions from one programming language to another, code under active development and bugs that were not spotted during the QA process (if there were any). Midway through our research, additional technical information and news of EHDevel [framework have emerged. You can find a partial technical description of EHDevel over at](http://www.4hou.com/info/news/5760.html) [4HOU (warning: Chinese), as well as news on the India/Pakistan cyberattack in a Reuters](https://www.reuters.com/article/us-india-cyber-threat/exclusive-india-and-pakistan-hit-by-spy-malware-cybersecurity-firm-idUSKCN1B80Y2) report. [Download the whitepaper](https://www.bitdefender.com/files/News/CaseStudies/study/171/Bitdefender-Whitepaper-EHDevel-A4-en-EN.pdf) **TAGS** [anti-malware research](http://10.10.0.46/blog/labs/tag/antimalware-research/) [whitepapers](http://10.10.0.46/blog/labs/tag/whitepapers/) ----- **AUTHOR** ## Alexandru MAXIMCIUC I'm a veteran security researcher with more than a decade of experience. His research is mostly focused on exploits, advanced persistent threats, cybercrime investigations, and packing technologies. [View all posts](http://10.10.0.46/blog/labs/author/amaximciuc/) **YOU MIGHT ALSO LIKE** **Bookmarks** ## Alexandru MAXIMCIUC I'm a veteran security researcher with more than a decade of experience. His research is mostly focused on exploits, advanced persistent threats, cybercrime investigations, and packing technologies. [View all posts](http://10.10.0.46/blog/labs/author/amaximciuc/) **YOU MIGHT ALSO LIKE** -----