A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.
Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."
"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."
Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.
The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.
To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.
The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.
The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.
StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.
"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."
More information- Hacking Tools Free Download
- Hacker Tools List
- Hacking Apps
- Hacking Tools For Windows
- Pentest Tools Linux
- Pentest Tools Apk
- Pentest Tools Android
- Tools For Hacker
- Pentest Tools Find Subdomains
- Hacking Tools Software
- New Hack Tools
- Easy Hack Tools
- Hack Tools Online
- Hack Rom Tools
- Hacking Tools For Kali Linux
- World No 1 Hacker Software
- Pentest Tools Website Vulnerability
- Hacking Tools Hardware
- Pentest Tools Find Subdomains
- Hacker
- Hacking Tools For Pc
- Hacking Tools 2019
- Pentest Tools Nmap
- Android Hack Tools Github
- Hacker Tools 2019
- Pentest Tools For Android
- Underground Hacker Sites
- Pentest Tools Framework
- Pentest Tools List
- Hacker Tools 2020
- Hacking Tools Windows 10
- Hacker Tools For Windows
- Hacking Tools For Mac
- Hacking Tools Hardware
- Hack Tools Download
- Hacking Tools Hardware
- Pentest Tools Windows
- Hacker Hardware Tools
- Nsa Hacker Tools
- Tools For Hacker
- Hacking Tools Pc
- Hack Tools For Games
- Pentest Tools Online
- Hack Tool Apk
- Hacker Tools Apk Download
- Pentest Tools Framework
- Pentest Tools Tcp Port Scanner
- Hacking Tools Kit
- Kik Hack Tools
- Hacker Hardware Tools
- Computer Hacker
- Hack Tools
- Pentest Tools Download
- How To Make Hacking Tools
- Hack Tools
- Pentest Tools Framework
- Pentest Tools Website Vulnerability
- World No 1 Hacker Software
- Hack Tools Pc
- Hack Rom Tools
- Pentest Tools Framework
- What Are Hacking Tools
- Hacking Tools And Software
- Hacker Tools
- Best Pentesting Tools 2018
- Hacking Tools Hardware
- Hacker Tools
- Bluetooth Hacking Tools Kali
- Hacker Search Tools
- Hacker Tool Kit
- Pentest Tools Subdomain
- Underground Hacker Sites
- Tools Used For Hacking
- Pentest Tools Website Vulnerability
- Install Pentest Tools Ubuntu
- Nsa Hacker Tools
- Hacker Tools For Windows
- Pentest Tools Framework
- Pentest Tools Alternative
- Hacker Tools 2020
- Android Hack Tools Github
- Pentest Tools
- Pentest Tools For Android
- Kik Hack Tools
- Hacking Tools And Software
- Pentest Tools Github
- Hacker Tools Apk
- Hacker Search Tools
- Hacker Tools List
- Hacking Tools For Windows Free Download
- Hacker Tools Free Download
- Hack Tools For Games
- Termux Hacking Tools 2019
- Hacker Tool Kit
- Bluetooth Hacking Tools Kali
- Hacker Tools Free Download
- Hacking Tools Kit
- Easy Hack Tools
- Hak5 Tools
- Pentest Tools Alternative
- Nsa Hacker Tools
- Pentest Tools Download
- Pentest Tools Linux
- New Hack Tools
- Hacking Tools And Software
- Hacking Tools Windows
- Pentest Tools Download
- Blackhat Hacker Tools
- Hacking Tools For Windows 7
- Pentest Tools For Android
- Hacking Tools 2019
- Hack Tools For Games
- Pentest Tools Review
- Hacking Tools Software
- Hack Tools For Ubuntu
- Install Pentest Tools Ubuntu
- Hack Website Online Tool
- Hacks And Tools
- Hacker Security Tools
- Pentest Tools For Android
- Nsa Hack Tools
- Hacking Tools Free Download
- Hacker Tools List
No hay comentarios:
Publicar un comentario
Nota: solo los miembros de este blog pueden publicar comentarios.