A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.
Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."
"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."
Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.
The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.
To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.
The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.
The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.
StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.
"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."
More articles
- How To Install Pentest Tools In Ubuntu
- Hacking Tools Pc
- Pentest Tools For Mac
- Hacker Tools For Ios
- Wifi Hacker Tools For Windows
- New Hacker Tools
- Hack Tools For Windows
- Tools Used For Hacking
- How To Make Hacking Tools
- New Hack Tools
- Hacking Tools For Beginners
- Hacker Techniques Tools And Incident Handling
- Hacker Search Tools
- Pentest Box Tools Download
- How To Hack
- Pentest Tools For Windows
- Termux Hacking Tools 2019
- Pentest Tools Framework
- Pentest Tools Framework
- Underground Hacker Sites
- Hacking Tools Online
- Pentest Tools Website
- Hacking Tools Usb
- Hacking Tools Github
- How To Make Hacking Tools
- Pentest Tools For Mac
- Hacking Tools For Windows 7
- Hacking Tools For Pc
- Hacking Tools For Windows Free Download
- Pentest Tools Linux
- Pentest Tools Review
- Hacker Techniques Tools And Incident Handling
- Hack Tools 2019
- Hacking Tools Free Download
- Hacker Tools Software
- Best Hacking Tools 2020
- Pentest Tools Android
- Hacking Tools Software
- Nsa Hack Tools Download
- Hacker Tools Linux
- World No 1 Hacker Software
- Pentest Box Tools Download
- Hacker Techniques Tools And Incident Handling
- Hacker Tools For Windows
- Hacking Tools And Software
- Hack Tools For Ubuntu
- Tools 4 Hack
- Computer Hacker
- Pentest Tools Find Subdomains
- Pentest Tools Kali Linux
- World No 1 Hacker Software
- World No 1 Hacker Software
- Hacker Tools Hardware
- Tools For Hacker
- Pentest Tools Find Subdomains
- Pentest Automation Tools
- Hack Tools For Games
- Github Hacking Tools
- Hacking Tools For Windows 7
- Termux Hacking Tools 2019
- Hacker Tools For Windows
- Hacker Tools For Ios
- Hacker Tool Kit
- Pentest Tools Website Vulnerability
- What Is Hacking Tools
- Hacker Tools 2019
- Pentest Box Tools Download
- Hacker Tools Apk Download
- Pentest Tools
- Hacking Tools Kit
- Hacker Tools 2019
- Hacking Tools 2019
- Hak5 Tools
- Pentest Tools Review
- Pentest Tools Bluekeep
- Wifi Hacker Tools For Windows
- Hacking Tools For Beginners
- Pentest Tools For Android
- Nsa Hacker Tools
- Black Hat Hacker Tools
- Pentest Tools For Android
- Hack Tools
- Hacking Tools Github
- Hacking Tools Windows 10
- Underground Hacker Sites
- Hacking Tools For Beginners
- Hack Rom Tools
- Hacker Tools
- World No 1 Hacker Software
- Pentest Tools Github
- Hacker Tools For Ios
- Pentest Tools List
- Best Hacking Tools 2020
- Pentest Tools Tcp Port Scanner
- Pentest Tools Download
- Hack Tools Download
- Hacker
- Hacker Tools For Pc
- Hacker Tools Online
- Nsa Hack Tools Download
- Hacker Tools Apk Download
- Hacker Security Tools
- Hacker Tools Free
- Hack Rom Tools
- Hacking Tools Usb
- Game Hacking
- Hacker
- Hacking Tools Mac
- Hacker Tool Kit
- Usb Pentest Tools
- Hacker Tools For Ios
- Hackers Toolbox
- Hack Tools Online
- Pentest Tools For Ubuntu
- Hacker Tools Free
- Pentest Tools Website Vulnerability
- How To Hack
- Hacking Tools Windows 10
- World No 1 Hacker Software
- Tools 4 Hack
- What Are Hacking Tools
- Hacker Search Tools
- World No 1 Hacker Software
- Pentest Tools Download
- Hacker Tools List
- Pentest Tools Url Fuzzer
- Hacking Tools Software
- Pentest Tools Nmap
- Pentest Tools Android
- Black Hat Hacker Tools
- Best Hacking Tools 2020
- Github Hacking Tools
- Pentest Recon Tools
- Game Hacking
- Tools Used For Hacking
- Hacking Tools And Software
- Ethical Hacker Tools
- Hacker Tools Linux
- Hacking Tools Free Download
- Blackhat Hacker Tools
- Hacking Tools Hardware
- Pentest Tools List
- Hackers Toolbox
- Hack Tools Github
- Android Hack Tools Github
- Hacker Tools For Ios
- Hacker Tools Online
- Pentest Tools Bluekeep
- Pentest Tools Bluekeep
- Pentest Tools Android
- Hacker Tools Linux
- Best Pentesting Tools 2018
- Hacker Tools Github
- Android Hack Tools Github
- Hacker Tools Software
- Github Hacking Tools
- Hacking Tools Kit
- Hack Website Online Tool
- Pentest Box Tools Download
- Hacker Tools 2019
- Hacking Tools Kit
- Hacking Tools Windows 10
- Pentest Tools
- Hacking Tools
- Hacker Tools Apk
- Hacker Tools Windows
- Hack Tools
- Hack Tools For Windows
- Hacking Tools For Windows 7
- World No 1 Hacker Software
- Tools For Hacker
- Hacker Search Tools
- Hacking Tools For Pc
- Hacking Tools Windows
- Pentest Tools Linux
- Pentest Tools Kali Linux
- Hacker Tools Software
No comments:
Post a Comment
All comments are welcome, but if you choose to comment using the "anonymous" button, please be sure to include your name at the end. All TRULY anonymous comments will be deleted. Thanks for your understanding...Blaine (aka 5KidMom)