Cyware Social will be sunset on April 15, 2026. The service is being replaced by Cyware’s Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us here → for more details.

Researchers have warned against the increased use of free-to-use browser automation frameworks by attackers.

Browser automation framework

According to a report, the framework called Browser Automation Studio (BAS) includes various features that can be used in malicious activities. The framework is a Windows-only automation environment.
  • The technical entry bar for the framework is very low. It is suspected to be done intentionally, to attract more contributors and content developers.
  • At the same time, the threat actors in the underground economy promote their time for the creation of bespoke tooling.

Attack payloads

  • Researchers observed C2 IP addresses linked with malware such as BlackGuard, Bumblebee, and RedLine Stealer communicating with the subdomain of Bablosoft.
  • Further, several hosts were linked with XMRig and Tofsee miners, which communicated with a second subdomain fingerprints[.]bablosoft[.]com, to use a service that helps the miner hide its behavior.

About BAS 

The BAS Framework is developed by Bablosoft, a firm offering various other automation and utility tools.
  • The framework was spotted in February 2021 and included the ability to automate tasks in Google's Chrome browser.
  • It is believed that the operators of the malware campaigns are linked to the Bablosoft subdomain (downloads[.]bablosoft[.]com) to download additional tools for use as part of their post-exploitation activities.

Conclusion

Based on the number of attackers already using tools offered on the Bablosoft website, experts expect BAS to become a more common component in the threat actor's toolkit in the coming time. Thus, organizations should implement unique passwords and stop users from using compromised credentials.
Cyware Publisher

Publisher

Cyware