miércoles, 17 de enero de 2024

New Wave Of Cyber Attacks Target Palestine With Political Bait And Malware

 

Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.

The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.

The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.

The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."

Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.

                                    Decoy document containing text on Palestinian reunification

The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.

The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.

"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.

"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."



More info


  1. Pentest Box Tools Download
  2. Blackhat Hacker Tools
  3. Hacker Tools Windows
  4. Hack Apps
  5. Hacker Tools Github
  6. Pentest Tools Find Subdomains
  7. Hack Tool Apk
  8. Hacker Tools Free Download
  9. Hacking Tools Online
  10. Pentest Tools Download
  11. Pentest Tools For Android
  12. Pentest Tools Download
  13. Hacker Tools For Pc
  14. Kik Hack Tools
  15. Nsa Hack Tools Download
  16. Hacker Tools 2020
  17. Best Hacking Tools 2020
  18. Hack Rom Tools
  19. Hack Tools Online
  20. Hacking Tools 2019
  21. Kik Hack Tools
  22. Hack Tools For Mac
  23. Hack Tools For Ubuntu
  24. Pentest Tools Review
  25. Hackers Toolbox
  26. Ethical Hacker Tools
  27. Hacking Tools Pc
  28. Hacker Tools For Pc
  29. Pentest Tools Website
  30. Pentest Tools Website Vulnerability
  31. Pentest Tools Website
  32. Hacker Tools Linux
  33. Hacking Tools For Windows
  34. Hack Tools
  35. Pentest Tools Apk
  36. Tools Used For Hacking
  37. Pentest Tools Find Subdomains
  38. Hak5 Tools
  39. Hack Tools Download
  40. Pentest Tools
  41. Hack Tools For Games
  42. Hacking Tools For Pc
  43. Hacking Tools Software
  44. Hacking Tools For Kali Linux
  45. Pentest Tools Website
  46. Hacking Tools For Beginners
  47. Underground Hacker Sites
  48. Hacker Tools
  49. Hack Tools
  50. Hack Tools Pc
  51. Usb Pentest Tools
  52. Hacker Tools Apk
  53. Hacker Tools For Mac
  54. Pentest Tools For Ubuntu
  55. Hacker Search Tools
  56. Hacking Tools Hardware
  57. Physical Pentest Tools
  58. Github Hacking Tools
  59. Pentest Tools Url Fuzzer
  60. Hack Tool Apk No Root
  61. Hack Tools Pc
  62. Hacker Tools Windows
  63. Pentest Tools
  64. Pentest Tools Online
  65. Tools 4 Hack
  66. Hack Tools Github
  67. Hacking Tools Free Download
  68. Hacker Tools Windows
  69. Tools For Hacker
  70. Pentest Tools Find Subdomains
  71. Tools 4 Hack
  72. Beginner Hacker Tools
  73. Hacker Techniques Tools And Incident Handling
  74. Hacking Tools For Kali Linux
  75. Pentest Tools
  76. Pentest Tools Port Scanner
  77. Top Pentest Tools
  78. Hacker Tools Online
  79. Pentest Tools Linux
  80. How To Install Pentest Tools In Ubuntu
  81. Pentest Tools Website Vulnerability
  82. Hacker Tools 2020
  83. Hack Tools Online
  84. Hacker Tools For Pc
  85. Hacker Tools Windows
  86. Pentest Tools List
  87. Android Hack Tools Github
  88. Pentest Tools Tcp Port Scanner
  89. Hacking Tools For Beginners
  90. Hacker Hardware Tools
  91. Nsa Hack Tools Download
  92. Hacking Tools For Beginners
  93. Free Pentest Tools For Windows
  94. Hacking Tools For Beginners
  95. Pentest Tools Subdomain
  96. Pentest Tools Tcp Port Scanner
  97. Pentest Tools Linux
  98. Hacking Apps
  99. Hacking Tools For Pc
  100. Hack Tools 2019
  101. Hacker Tools Free

No hay comentarios.: