Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.
The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.
The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.
The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."
Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.
Decoy document containing text on Palestinian reunification
The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.
The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.
"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.
"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."
- Pentest Tools Online
- Game Hacking
- Hacking Tools Hardware
- Hacker Tools
- Hacker Tools Linux
- Hacker Search Tools
- Nsa Hack Tools Download
- Hacking Tools
- Hacker Search Tools
- Hacking App
- Best Pentesting Tools 2018
- Hacker Tools Github
- Ethical Hacker Tools
- Hack Apps
- Hacking Tools For Beginners
- Hackers Toolbox
- Hack Tools For Ubuntu
- Hack Rom Tools
- Tools For Hacker
- World No 1 Hacker Software
- Termux Hacking Tools 2019
- Kik Hack Tools
- Nsa Hacker Tools
- Hacking Tools Mac
- Hack Tools For Games
- Hacker Tools For Windows
- Hacking Tools Pc
- Pentest Tools Nmap
- Hacking Tools Windows
- Hack Tools Online
- Hack Tools
- Hacker Tools List
- Hacker Tools Free
- Hacking Tools Usb
- Hacking Tools Usb
- Hacking Tools Github
- Hacking Tools Pc
- Pentest Tools Kali Linux
- Hacker Tools Apk
- Hacking Tools Kit
- Pentest Tools For Android
- Pentest Box Tools Download
- What Is Hacking Tools
- How To Install Pentest Tools In Ubuntu
- Pentest Automation Tools
- Hacker Tools Github
- Hack Tools Mac
- Hacker Tools Online
- Pentest Tools Open Source
- Hack Tools Download
- Tools Used For Hacking
- Pentest Recon Tools
- Pentest Reporting Tools
- Hacker Tools
- Android Hack Tools Github
- Github Hacking Tools
- Hacking Apps
- Hacker Tools Hardware
- Nsa Hack Tools
- Hacker Tools Free Download
- Pentest Tools Apk
- Best Pentesting Tools 2018
- What Is Hacking Tools
- Nsa Hack Tools
- Hacking Apps
- Pentest Tools Bluekeep
- Pentest Tools Url Fuzzer
- Hacker Techniques Tools And Incident Handling
- Pentest Recon Tools
- Nsa Hack Tools
- Hacker Tools For Pc
- Pentest Tools Url Fuzzer
- Hacker Tools Online
- Game Hacking
- Best Hacking Tools 2020
- Hack Tools For Pc
- Hacking Tools For Beginners
- Hacker Tools Online
- Easy Hack Tools
- Game Hacking
- Hacker Tools Hardware
- Wifi Hacker Tools For Windows
- Hack Tools 2019
- Hacking Tools 2020
- Hacker Tools Apk
- Pentest Tools For Android
- Underground Hacker Sites
- Black Hat Hacker Tools
- Hacker Tools 2020
- Pentest Tools Website
- Pentest Tools For Windows
- Hack Tools
- Hack App
- Hacking Tools Name
- Hacking Tools Software
- Hackrf Tools
- Pentest Tools Review
- Hacker Tools Hardware
- Ethical Hacker Tools
- Hacking Tools Software
- Hacker Techniques Tools And Incident Handling
- Hacking Tools For Beginners
- Hack And Tools
- What Are Hacking Tools
- Pentest Tools For Windows
- Android Hack Tools Github
- Hacking Tools For Windows Free Download
- Pentest Recon Tools
- Pentest Tools For Android
- Growth Hacker Tools
- Hacking Tools Windows 10
- Pentest Tools For Mac
- Bluetooth Hacking Tools Kali
- Hacking Tools Windows 10
- Hacking Tools For Beginners
- How To Hack
- Pentest Tools For Windows
- Hack Apps
- Free Pentest Tools For Windows
- Pentest Tools Windows
- Hacker Tools For Ios
- Nsa Hack Tools
- Hackers Toolbox
- Black Hat Hacker Tools
- Best Pentesting Tools 2018
- Hacker Tools Hardware
- Top Pentest Tools
- Hack Tools Mac
- Hacking Tools Software
- Hacking Tools For Games
- Hacking Tools Download
- Underground Hacker Sites
- Hacking Tools Usb
- Hackrf Tools
- Pentest Tools For Android
- Pentest Tools Apk
- Pentest Tools Free
- Hack Tools Pc
- Hacker Tools Online
- Hacking Tools For Windows Free Download
- Hacker Tools Software
- Hacking Tools For Games
- Hacking Tools Pc
- Pentest Tools Website Vulnerability
- Hack Rom Tools
- Hack Tools Mac
- Pentest Tools Url Fuzzer
- How To Hack
- Hacker Tools Github
- Hacking App
- Hacking Tools 2020
- Hacker Tools Apk
- Pentest Tools Url Fuzzer
- Hacking Tools For Kali Linux
- Best Pentesting Tools 2018
- Tools For Hacker
- How To Make Hacking Tools
- Best Hacking Tools 2019
- Hacker Tools 2019
- Top Pentest Tools
- Hacker Tools For Ios
- Hacker Tools Linux
- Pentest Tools Website Vulnerability
No comments:
Post a Comment