New Wave Of Cyber Attacks Target Palestine With Political Bait And Malware

 

Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.

The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.

The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.

The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."

Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.

                                    Decoy document containing text on Palestinian reunification

The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.

The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.

"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.

"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."



More info
  1. Hacking Tools Windows 10
  2. Hack Tools
  3. Nsa Hacker Tools
  4. Hackers Toolbox
  5. Ethical Hacker Tools
  6. Hacker Security Tools
  7. Hacking Tools Windows 10
  8. Hacking Tools For Windows
  9. Hak5 Tools
  10. Pentest Tools Find Subdomains
  11. Hacking Tools Software
  12. Pentest Tools Linux
  13. What Is Hacking Tools
  14. Hacker Security Tools
  15. Hacking Apps
  16. Pentest Recon Tools
  17. Blackhat Hacker Tools
  18. Pentest Automation Tools
  19. How To Install Pentest Tools In Ubuntu
  20. Hack Tools Online
  21. Pentest Tools Tcp Port Scanner
  22. Install Pentest Tools Ubuntu
  23. Hacking Tools And Software
  24. Hack Tools For Ubuntu
  25. Pentest Tools Website Vulnerability
  26. Hacker Tools Online
  27. Pentest Tools Website
  28. Hack Rom Tools
  29. Hacker Search Tools
  30. Hacker Tools Free Download
  31. Hacker Tools For Mac
  32. Hacker Tools List
  33. Best Pentesting Tools 2018
  34. Hack Tools
  35. Android Hack Tools Github
  36. Tools For Hacker
  37. Pentest Reporting Tools
  38. New Hacker Tools
  39. Computer Hacker
  40. Hack Tools For Ubuntu
  41. Nsa Hack Tools Download
  42. Hacking Tools Software
  43. Install Pentest Tools Ubuntu
  44. Hacking Tools Hardware
  45. Hack Tools Pc
  46. Pentest Tools Open Source
  47. Hacker Tools For Pc
  48. Nsa Hack Tools
  49. Computer Hacker
  50. Hacking Tools Online
  51. Hacking Tools For Mac
  52. Hacking Tools Name
  53. Pentest Tools Port Scanner
  54. Pentest Tools Online
  55. Hacking Tools Mac
  56. Hacking Tools Name
  57. World No 1 Hacker Software
  58. Hack Tools Github
  59. Hack Tools For Windows
  60. Hacking Tools Kit
  61. Hacking Tools For Mac
  62. Bluetooth Hacking Tools Kali
  63. Best Pentesting Tools 2018
  64. Pentest Tools Free
  65. Pentest Tools Bluekeep
  66. Pentest Tools Port Scanner
  67. Best Hacking Tools 2019
  68. Pentest Tools For Windows
  69. Pentest Tools Subdomain
  70. Hacking Tools 2019
  71. Hacker Tool Kit
  72. Hack And Tools
  73. Hack Tools
  74. Hacking Tools For Windows
  75. Growth Hacker Tools
  76. Hacker Tools Apk
  77. Hacking Tools Windows 10
  78. Pentest Tools Url Fuzzer
  79. Hack Tool Apk No Root
  80. Pentest Tools Port Scanner
  81. Hacking Tools For Pc
  82. Hacking Tools For Windows 7
  83. Hack App
  84. Hacker Tools For Pc
  85. Hacker Tools
  86. Hacker Tools Online
  87. Growth Hacker Tools
  88. Easy Hack Tools
  89. Hacker Tools 2020
  90. Hack Tool Apk
  91. Android Hack Tools Github
  92. Hack Tools Online
  93. Pentest Automation Tools
  94. Pentest Reporting Tools
  95. Hacker Tools Github
  96. Hacking Tools Windows 10
  97. Hacking Tools Usb
  98. World No 1 Hacker Software
  99. Pentest Tools Download
  100. Hacking Tools Name
  101. Hacking Tools Github
  102. Hacking Tools For Mac
  103. Hacker Tools For Pc
  104. Tools 4 Hack
  105. Hak5 Tools
  106. Hacker Tools For Mac
  107. Blackhat Hacker Tools
  108. New Hack Tools

0 comments:

Post a Comment

Request Item or Service

Powered by Blogger.