Sunday, 28 May 2023

New Wave Of Cyber Attacks Target Palestine With Political Bait And Malware

 

Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.

The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.

The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.

The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."

Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.

                                    Decoy document containing text on Palestinian reunification

The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.

The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.

"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.

"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."



Related links
  1. How To Install Pentest Tools In Ubuntu
  2. Hacking Tools For Kali Linux
  3. Computer Hacker
  4. Hacking Tools For Windows
  5. Hacking Tools Online
  6. Tools 4 Hack
  7. How To Install Pentest Tools In Ubuntu
  8. How To Hack
  9. Best Hacking Tools 2020
  10. Wifi Hacker Tools For Windows
  11. Pentest Tools Open Source
  12. Pentest Box Tools Download
  13. Hacker Tools 2019
  14. Hacker Tools Github
  15. Hacker Tools
  16. Pentest Tools Subdomain
  17. World No 1 Hacker Software
  18. Hacking Tools And Software
  19. What Are Hacking Tools
  20. Hacker Tools 2019
  21. Hacking Tools For Pc
  22. Termux Hacking Tools 2019
  23. Hack Website Online Tool
  24. Hacker Tools Github
  25. Android Hack Tools Github
  26. Github Hacking Tools
  27. Pentest Tools Kali Linux
  28. How To Install Pentest Tools In Ubuntu
  29. Hacker Tools For Windows
  30. Nsa Hack Tools Download
  31. Hack Website Online Tool
  32. Hacker Techniques Tools And Incident Handling
  33. Hacker Search Tools
  34. Computer Hacker
  35. Hacking Tools For Windows Free Download
  36. Github Hacking Tools
  37. Hack Tools
  38. Hacking Tools For Windows 7
  39. Hacking Tools 2019
  40. Hacking Tools Free Download
  41. Hacking Tools For Pc
  42. Hacker Tools Github
  43. Hacker Tools Linux
  44. Pentest Tools Apk
  45. Hack Apps
  46. Black Hat Hacker Tools
  47. Pentest Recon Tools
  48. Hacking Tools For Windows Free Download
  49. Hack Tools Online
  50. Pentest Tools Nmap
  51. Hacking App
  52. Pentest Tools Subdomain
  53. How To Make Hacking Tools
  54. Hacker Techniques Tools And Incident Handling
  55. Underground Hacker Sites
  56. Pentest Tools Port Scanner
  57. Hacking Tools Github
  58. World No 1 Hacker Software
  59. Pentest Tools Tcp Port Scanner
  60. Hack Tools 2019
  61. Game Hacking
  62. Pentest Tools Download
  63. Hack Tools For Games
  64. Pentest Tools For Mac
  65. Hacking Tools For Kali Linux
  66. Hacking Tools Software
  67. Bluetooth Hacking Tools Kali
  68. Hacking App
  69. Hacking Tools Hardware
  70. Hacker Tools Windows
  71. Pentest Tools Kali Linux
  72. Hack Tools
  73. Hacker Security Tools
  74. Hacker Tools Free
  75. Wifi Hacker Tools For Windows
  76. Pentest Tools For Mac
  77. Hacker Tools Online
  78. Hacker Search Tools
  79. Hacker Tools For Ios
  80. Install Pentest Tools Ubuntu
  81. Hack Website Online Tool
  82. Android Hack Tools Github
  83. Physical Pentest Tools
  84. Hacking Tools For Mac
  85. Hacker Tools Mac
  86. Hack App
  87. Hacking Tools Hardware
  88. Best Pentesting Tools 2018
  89. Hacker Tools List
  90. Pentest Tools Apk
  91. Hacking Tools For Windows Free Download
  92. Install Pentest Tools Ubuntu
  93. New Hacker Tools
  94. Pentest Automation Tools
  95. Computer Hacker
  96. Physical Pentest Tools
  97. Hacking Tools For Windows
  98. What Is Hacking Tools
  99. Pentest Tools Url Fuzzer
  100. Pentest Tools Free
  101. Hacker Tools Linux
  102. Hacker Tools Hardware
  103. Hack Tools Download
  104. Pentest Box Tools Download
  105. Hackers Toolbox
  106. Pentest Tools Windows
  107. Hacker Tools Free
  108. Hacker Tool Kit
  109. Hacking Tools Usb
  110. Hacking App
  111. Hacker Techniques Tools And Incident Handling
  112. Hacking Tools Kit
  113. Hacking Tools For Beginners
  114. Free Pentest Tools For Windows
  115. Hacking Tools Windows
  116. Hackers Toolbox
  117. Pentest Tools For Android
  118. Hacker Tools For Mac
  119. Hacker Tools Mac
  120. Hacks And Tools
  121. Hacker Security Tools
  122. Hack Tool Apk
  123. Pentest Tools Tcp Port Scanner
  124. Hacker
  125. Hacker Hardware Tools
  126. Hacker Tools 2020
  127. Hacks And Tools
  128. Nsa Hack Tools Download
  129. Computer Hacker
  130. Pentest Tools Free
  131. Hacker Tools
  132. Nsa Hack Tools
  133. Hacking Tools 2020
  134. Pentest Tools Website Vulnerability
  135. Tools Used For Hacking
  136. Hack Tools 2019
  137. Install Pentest Tools Ubuntu
  138. Hacking Tools Windows 10
  139. Hack Rom Tools
  140. Hacking Tools Software
  141. Hacker Tools Linux
  142. Pentest Tools Kali Linux
  143. Hack Tools Online
  144. Ethical Hacker Tools
  145. Hacking Tools Download
  146. Computer Hacker
  147. How To Make Hacking Tools
  148. Game Hacking
  149. Hack Tools
  150. Hacking Tools For Windows 7
  151. Hack Tools For Pc
  152. Usb Pentest Tools
  153. Hacking Tools Windows
  154. Pentest Tools Open Source
  155. Pentest Tools Kali Linux
  156. Pentest Tools Url Fuzzer
  157. Hacking Tools Kit
  158. Hack Tools Download
  159. Pentest Tools Port Scanner
  160. Hacker
  161. Pentest Tools Kali Linux

No comments:

Post a Comment