A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.
Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."
"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."
Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.
The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.
To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.
The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.
The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.
StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.
"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."
Related links- World No 1 Hacker Software
- Hack Tools For Games
- Hacking Tools For Windows 7
- Hacking Tools And Software
- Hak5 Tools
- Pentest Tools List
- Hack Tool Apk
- Pentest Automation Tools
- Hacker Tools
- Hack Website Online Tool
- Pentest Tools Find Subdomains
- Hacking Tools Usb
- Growth Hacker Tools
- Pentest Tools Free
- Best Hacking Tools 2019
- Hacking Tools And Software
- Hacking Tools For Windows 7
- Pentest Tools Website Vulnerability
- Pentest Tools Find Subdomains
- Hack And Tools
- Hack Tools For Ubuntu
- Hack Tools 2019
- What Are Hacking Tools
- Nsa Hacker Tools
- Hacker Search Tools
- Easy Hack Tools
- Hak5 Tools
- Hacks And Tools
- Pentest Tools For Mac
- Pentest Tools Download
- Hacker Tools For Pc
- Hack Tools
- Best Pentesting Tools 2018
- Hacker Tools For Mac
- Pentest Tools Nmap
- Hacker Tools Apk
- Hacking Tools For Windows
- Hackrf Tools
- Game Hacking
- Hacker Tools Windows
- Hacking Apps
- Pentest Tools For Mac
- Hacking Tools Github
- Hack Tools
- Hacking Tools For Mac
- Pentest Tools Url Fuzzer
- Physical Pentest Tools
- Tools 4 Hack
- Pentest Tools Open Source
- Best Hacking Tools 2020
- Pentest Tools Framework
- New Hack Tools
- Blackhat Hacker Tools
- Hacker Tools For Ios
- Hacker Tool Kit
- Pentest Tools For Ubuntu
- Hacker Search Tools
- Hacker Tools Linux
- Black Hat Hacker Tools
- Hacker
- Hack Tools
- Hacker Tools For Mac
- Hack Tools For Ubuntu
- Kik Hack Tools
- Pentest Tools For Ubuntu
- Ethical Hacker Tools
- Black Hat Hacker Tools
- Pentest Tools Bluekeep
- Hacker Tools Linux
- New Hacker Tools
- What Are Hacking Tools
- Hacker Tools For Ios
- Pentest Box Tools Download
- Pentest Tools For Mac
- Hacking App
- What Is Hacking Tools
- Hack Website Online Tool
- Hacking Tools Kit
- Hacking Tools Usb
- Tools For Hacker
- Hack Tools 2019
- Hacking Tools Github
- Hacking Tools Download
- Pentest Tools List
- Hack Tools 2019
- Pentest Recon Tools
- Pentest Tools Kali Linux
- Pentest Tools Subdomain
- Hacker Tools For Windows
- Hacker Tools Online
- Pentest Tools Website
- Hack And Tools
- Hack Tools Mac
- Hacker Tools Free Download
- Hacking Tools
- Pentest Tools Android
- Hacking Tools Usb
- Pentest Tools Website Vulnerability
- Hacking Tools Mac
- Hacker Hardware Tools
- Hacking Tools Pc
- Pentest Tools Find Subdomains
- Hacker Tools List
- Hacking Tools Free Download
- Hack Tools Mac
- Pentest Tools Review
- Pentest Tools Review
- Pentest Tools Website Vulnerability
- Hacking Tools 2020
- Hack Tools Download
- Pentest Tools Open Source
- Pentest Tools Find Subdomains
- Hack Tools Mac
- Pentest Tools Url Fuzzer
- Nsa Hacker Tools
- Beginner Hacker Tools
- Hacker Tools Free
- Hacking App
- New Hacker Tools
- How To Hack
- Hacking Apps
- Hacker Tools For Mac
- Hack Tool Apk
- Hacking Tools For Beginners
- Hacker Tools Mac
- Hacking Tools For Windows 7
- Hacker Tool Kit
- Tools 4 Hack
- Ethical Hacker Tools
- Hacking Tools For Windows 7
- Hacker Tools Software
- Hack Tools Github
- Hacker Search Tools
- Hacker Tools 2020
- Hacker Tools Free Download
- Underground Hacker Sites
- Hack App
- New Hack Tools
- Black Hat Hacker Tools
- Pentest Tools Find Subdomains
- Growth Hacker Tools
- Hacking Tools For Windows
- Pentest Tools Nmap
- New Hack Tools
- Hacker Tools
- Usb Pentest Tools
- Best Pentesting Tools 2018
- What Are Hacking Tools
- Pentest Tools For Ubuntu
- Hacker Tools Linux
- Computer Hacker
- Pentest Tools Website Vulnerability
- Pentest Tools Framework
- Hacks And Tools
- Game Hacking
- Hack Tools For Ubuntu
- Pentest Tools Windows
- Usb Pentest Tools
- Hacker Tools
- Pentest Tools Github
- Pentest Tools
- Hacker Hardware Tools
- Pentest Recon Tools
- Hack And Tools
- Wifi Hacker Tools For Windows
- Hack Tools
- Pentest Tools Open Source
- Pentest Tools Framework
No hay comentarios:
Publicar un comentario