CyberSecurity SEE

Hamas-Linked Hackers Probe Middle Eastern Diplomats

Hamas-Linked Hackers Probe Middle Eastern Diplomats


 

A cyber threat group affiliated with Hamas has been conducting espionage across the Middle East.

Wirte
— tracked by Palo Alto’s Unit 42 as “Ashen Lepus” — has been spying on
regional government bodies and diplomatic entities since 2018. Lately,
it’s been expanding its interests into countries less directly
associated with the Israel-Palestine conflict, like Oman and Morocco.
And to match its broadening scope,
Wirte has invented a new malware suite with a variety of features useful for evading cybersecurity programs.

“When
the group first started they used very simple tools — it didn’t seem
like the people behind the group had a lot of technical know-how,” say
Unit 42 researchers, who requested anonymity for this article. “However,
over the years we’ve seen this group evolve their tools and techniques;
we’re now observing an evolution and enhancement in their
capabilities.”

Hamas’s New Malware & TTPs

The Wirte playbook is in most ways textbook cyber espionage. Victims receive phishing emails with PDFs relating to the Israel-Palestine conflict.
When they follow a link in the PDF, they reach a file-sharing service
with a RAR archive waiting. Should they continue, they’ll trigger a
dynamic link library (DLL)
sideloading attack
in the background of their machine. They’ll then see the document they
were after, while Wirte’s infection chain quietly commences. Eventually,
the hackers will perform hands-on-keyboard activity to steal documents
of diplomatic and political significance.

Oddly,
Unit 42 found that early Wirte campaigns didn’t actually deliver full
and complete payloads. They concluded that “previous campaigns observed
in the wild were a testing phase in the development of the attack
chain,” which has only now come into its own with the introduction of a
fully formed malware suite called “AshTag.”

AshTag
consists of a loader, a stager, and a backdoor that can install a
variety of add-on modules, in that order. Like any good espionage suite,
these components were designed with stealth in mind. 

For
example, when it’s time for the loader to pull the stager from Wirte’s
command-and-control (C2) infrastructure, it doesn’t just find that
payload sitting idly on a web page. Instead, it’s embedded within the
page, sandwiched between HTML header tags, and the loader parses the
outwardly benign HTML to extract it. 

The
backdoor takes this trick one step further: the modules it downloads
can only be found by reading commented-out tags within the malicious
domain’s HTML — spots where most detection programs don’t look. Wirte
also diligently encrypts its payloads, and when published research
reveals its current methods, it switches them up.

Wirte’s Place in the Palestine Conflict

Wirte stands out from other Hamas-affiliated advanced persistent threats (APTs) for at least a couple of reasons.

Most notably, it has defied all Israeli war efforts in Gaza. Most Hamas-affiliated groups went silent
during the war. But even as the Israeli Defense Force (IDF) took
sledgehammers to the Gaza strip, systematically throttled its
electricity, and even
bombed Hamas-affiliated hackers, Wirte appears to have continued unabated.

Though
they aren’t certain, Unit 42 researchers say “the group’s continuous
activity throughout the conflict indeed suggests that they may be
operating from outside Gaza. It could be that they’re operating from the
West Bank or from other countries.”

That
Wirte appears a step removed from the thick of the Gaza conflict might
also help explain why, compared to other Hamas affiliates, it freely
targets more diverse Middle Eastern governments. More often than not,
it’s still focused on targets most closely associated with the
Israel-Palestine conflict, like Egypt, Jordan, and the Palestinian
Authority itself, which is based opposite of Hamas in the West Bank. But
Wirte seems to be bucking that trend nowadays.

Wirte’s
latest activity is still intrinsically tied to Palestinian affairs. Its
social engineering bait makes frequent references to Hamas itself, and
the ways in which regional governments like Turkey are engaged in the
conflict. But the researchers report that “we have observed scores of
unique lures deployed across the Middle East, indicating a persistent
and wide-reaching campaign.” 

Here,
“wide-reaching” can be understood both in the literal and figurative
sense. Oman and Turkey are as geographically distant as one can get from
Israel, in two directions, while still being considered Middle Eastern
(and Rabat is closer to Oslo than to Jerusalem). And while Turkey’s
president has involved himself in the Palestinian conflict in recent
years, the other two nations have kept some distance.

“The
expansion of Ashen Lepus’s victimology beyond their traditional
geographic targets, coupled with new lure themes, suggests a broadening
of its operational scope,” Unit 42 wrote in its report. “Organizations
in the Middle East, particularly in the governmental and diplomatic
sectors, should remain vigilant against this evolving threat.”

Reference:https://www.darkreading.com/



Source link

Exit mobile version