يتذكر فهداً رآه على شاشة التلفزيون،
فهدا قويا يحاصر ظبيا رضيعا
وحين دنا منه شم الحليب
فلم يفترسه

كأن الحليب يروض وحش الفلاة
م.د
"حنى الوحوش ترفض أن تفعل مثلكم وتؤذي الطفولة أيها المجرمون"

19‏/01‏/2024

Hacker Group 'Moses Staff' Using New StrifeWater RAT In Ransomware Attacks

 


A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.

Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."

"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."

Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.

The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.


To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.

The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.

The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.

StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.

"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."

Related news
  1. Pentest Tools For Mac
  2. Nsa Hacker Tools
  3. Hack Apps
  4. Pentest Tools Kali Linux
  5. Pentest Tools Kali Linux
  6. Wifi Hacker Tools For Windows
  7. Hack Apps
  8. Hack App
  9. Hacking Tools And Software
  10. Hacker Tools Hardware
  11. Blackhat Hacker Tools
  12. Hack Tools Download
  13. What Are Hacking Tools
  14. Hacker Tools Github
  15. Pentest Tools Online
  16. How To Make Hacking Tools
  17. Hacking Tools Download
  18. Hacking Tools Pc
  19. Hackers Toolbox
  20. Game Hacking
  21. Easy Hack Tools
  22. Hacking App
  23. Pentest Tools List
  24. Hacking Tools
  25. Pentest Tools Github
  26. Hack Tools Github
  27. Hacking Tools Download
  28. Hacking Tools Pc
  29. Hack Tool Apk No Root
  30. Pentest Tools List
  31. Pentest Tools Nmap
  32. Hacker Tools For Windows
  33. Hacker Hardware Tools
  34. Pentest Tools For Windows
  35. Pentest Tools Subdomain
  36. Usb Pentest Tools
  37. How To Hack
  38. Pentest Tools Framework
  39. Pentest Tools Url Fuzzer
  40. Free Pentest Tools For Windows
  41. Pentest Tools Website Vulnerability
  42. Hacking Tools Software
  43. Pentest Tools Online
  44. Hacking Tools 2019
  45. Hack Tools Mac
  46. Hacking Tools For Windows 7
  47. World No 1 Hacker Software
  48. Hackers Toolbox
  49. Hacking Tools Github
  50. Hacking Tools Free Download
  51. What Are Hacking Tools
  52. What Is Hacking Tools
  53. Termux Hacking Tools 2019
  54. Pentest Tools Linux
  55. Game Hacking
  56. Pentest Tools Free
  57. Pentest Tools Download
  58. Hacking App
  59. Ethical Hacker Tools
  60. Hack Tools Pc
  61. Hack Tools
  62. Hacking Tools For Kali Linux
  63. Hacking Tools For Windows
  64. Hacker Tools Software
  65. Tools 4 Hack
  66. Hacker Tools For Mac
  67. Hacker Tools 2020
  68. Hack Website Online Tool
  69. Free Pentest Tools For Windows
  70. Hacking Tools Online
  71. Pentest Reporting Tools
  72. Game Hacking
  73. Hacking Tools 2019
  74. Hacker Tools Apk
  75. Hacker Techniques Tools And Incident Handling
  76. Hacking Tools Pc
  77. Hacking Tools 2019
  78. Pentest Tools For Mac
  79. Hacker Tools Free Download
  80. Hacking Tools For Windows
  81. Hacker Tools Free Download
  82. Black Hat Hacker Tools
  83. Pentest Tools Website Vulnerability
  84. Hack Website Online Tool
  85. Hacking Tools For Games
  86. Hack Tools
  87. Hacking Tools 2019
  88. Pentest Tools Website
  89. Pentest Tools Github
  90. Hack Tools Github
  91. Pentest Tools Framework
  92. Hacker Tools Software
  93. Hacker Tools Apk
  94. Hack Tools Pc
  95. Hacker Tools For Pc
  96. Hacker Tools For Pc
  97. Hacker Tools 2020
  98. Hacking Tools Free Download
  99. Pentest Tools Alternative
  100. Pentest Automation Tools
  101. Pentest Tools Kali Linux
  102. Pentest Box Tools Download
  103. Computer Hacker
  104. Github Hacking Tools
  105. Pentest Tools Android
  106. Pentest Tools Website
  107. Best Pentesting Tools 2018
  108. Hacking Tools For Windows
  109. Hacking Tools For Beginners
  110. Hack Tools For Windows
  111. Pentest Tools Apk
  112. Hack Tools For Mac
  113. Growth Hacker Tools
  114. Hacker Tools For Windows
  115. Pentest Tools Alternative
  116. Hacking Tools For Pc
  117. Pentest Recon Tools
  118. Hacker Tools Github
  119. Tools 4 Hack
  120. Hacking Tools Name
  121. Hack And Tools
  122. Pentest Tools Linux
  123. Growth Hacker Tools
  124. Hacker Tools 2019
  125. New Hacker Tools
  126. Nsa Hacker Tools
  127. What Is Hacking Tools
  128. Hacker Tools Mac
  129. Hacker Search Tools
  130. Pentest Tools Alternative
  131. Pentest Tools Online
  132. Hack Rom Tools
  133. Hacking Tools Github
  134. Hacking Tools Kit
  135. Wifi Hacker Tools For Windows
  136. Pentest Tools Linux
  137. Hacking Tools For Windows Free Download
  138. Pentest Tools Alternative
  139. Android Hack Tools Github
  140. Hacker Tools Linux
  141. Hacker Tools
  142. Hacking Tools Hardware
  143. Pentest Tools Kali Linux
  144. Pentest Tools Android
  145. Black Hat Hacker Tools
  146. Hack Tools Pc
  147. Hacker Tools Apk
  148. Hacking Tools Pc
  149. Hacking Tools For Kali Linux
  150. Hacker Tools 2019
  151. Hacker Tools 2020
  152. Install Pentest Tools Ubuntu
  153. Hack Tools Download
  154. Hacking Tools Online
  155. Ethical Hacker Tools
  156. Pentest Tools Bluekeep
  157. Hacking Tools Online
  158. Pentest Tools Github
  159. Hacking Tools Github

ليست هناك تعليقات: