A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.
Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."
"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."
Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.
The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.
To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.
The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.
The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.
StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.
"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."
Related posts- Pentest Automation Tools
- Pentest Tools Nmap
- Hackrf Tools
- Physical Pentest Tools
- Computer Hacker
- Pentest Recon Tools
- Hacker Tools Apk
- Hacker Tools Github
- Hacker Tools Windows
- Hack And Tools
- Hacks And Tools
- Hack Apps
- Hack Tools
- Hack App
- Hacks And Tools
- Hacker Tools For Mac
- Top Pentest Tools
- Hacker Tools For Windows
- Black Hat Hacker Tools
- Hacking Tools Windows 10
- Hack Tools
- Hacking Tools Kit
- Hack Tools Mac
- Blackhat Hacker Tools
- Pentest Tools Apk
- Hackrf Tools
- Pentest Tools For Android
- Hacking Tools Windows 10
- Hacker Tools Software
- Pentest Tools Android
- Hack Tools Mac
- Pentest Tools Kali Linux
- Hacking Tools For Mac
- Hacker Tools For Mac
- Beginner Hacker Tools
- Hacker Search Tools
- Pentest Tools Nmap
- How To Install Pentest Tools In Ubuntu
- Pentest Tools For Ubuntu
- Hacker Tools Apk
- Hack Apps
- Game Hacking
- Hacking Tools For Windows
- Hacker Tools Software
- Android Hack Tools Github
- Hacker Tools For Mac
- Pentest Tools For Ubuntu
- Hacking Tools For Pc
- Hacker Tools Windows
- Hacking Tools For Games
- Beginner Hacker Tools
- Hacking Tools
- Growth Hacker Tools
- Hacker
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Pentest Box Tools Download
- Hackers Toolbox
- Hacker
- Pentest Tools For Windows
- Hacking Tools For Beginners
- Beginner Hacker Tools
- Pentest Tools Url Fuzzer
- Hack Rom Tools
- Hack Apps
- Hacker Tools Mac
- Computer Hacker
- Pentest Tools Android
- Hacking Tools For Games
- Hacker Tools List
- Hack App
- Hacking Tools Name
- Hacker
- Pentest Tools Free
- Pentest Tools Website
- Hack Tools For Ubuntu
- Tools For Hacker
- Pentest Tools Website
- Hacking Apps
- Physical Pentest Tools
- New Hacker Tools
- Hacking Tools For Beginners
- Pentest Tools Website
- Pentest Tools Open Source
- Pentest Tools Kali Linux
- Hack Tool Apk No Root
- Hack App
- Pentest Tools List
- Hacker Tools Windows
- Hack Rom Tools
- Hacker Tools For Mac
- Hacker Tools Linux
- Pentest Tools Subdomain
- Hacking Tools Download
- Hack Tools Github
- Hacker Search Tools
- Pentest Recon Tools
- Hacking Tools Name
- Hack App
- Ethical Hacker Tools
- Hacking Tools
- Free Pentest Tools For Windows
- Pentest Tools Download
- Hack Tools For Games
- Underground Hacker Sites
- Nsa Hacker Tools
- Pentest Tools List
- Pentest Tools Apk
- Hacker Tools For Pc
- How To Make Hacking Tools
- Hacking Tools For Windows Free Download
- Hacker Tool Kit
- Hacks And Tools
- Hack And Tools
- Kik Hack Tools
- Pentest Tools Github
- Top Pentest Tools
- Hack And Tools
- Pentest Tools Review
- Hacking Tools Software
- Hacking Tools For Mac
- Hacking Tools 2020
- Hacking Tools For Windows Free Download
- Hack Apps
- Pentest Tools Subdomain
- Pentest Tools
- Best Pentesting Tools 2018
- Growth Hacker Tools
- Wifi Hacker Tools For Windows
- Hacking Tools Online
- Hack Apps
- Hacking Tools 2019
- Pentest Tools Subdomain
- Hak5 Tools
- Hacking Tools Name
- Hack Tool Apk No Root
- What Are Hacking Tools
- Hack Apps
- Hack Tools
- Hacker Tools
- Easy Hack Tools
- Pentest Tools Nmap
- Pentest Tools For Android
- Hacking Tools For Kali Linux
- Tools 4 Hack
- Hacking Tools For Windows
- Hacker Tools 2020
- Termux Hacking Tools 2019
No comments:
Post a Comment