HomeCII/OTIran Launches Coordinated APT Campaign, Targeting Israel and Albania with Wiper Attacks

Iran Launches Coordinated APT Campaign, Targeting Israel and Albania with Wiper Attacks

Published on

spot_img

Iranian state-backed threat actors have been actively involved in spying on and carrying out destructive operations against major organizations in Albania and Israel.
One of the most sophisticated espionage actors linked to Iran’s Ministry of Intelligence and Security (MOIS) is Scarred Manticore, also known as Storm-861. This group has been conducting surveillance on high-value targets across the Middle East and beyond with great effectiveness. In a bold move, another MOIS advanced persistent threat (APT) known as Void Manticore, or Storm-842, has been capitalizing on Scarred Manticore’s initial access to launch its own destructive campaigns.

Void Manticore has reportedly targeted over 40 Israeli organizations and carried out high-profile campaigns in Albania as well. The collaboration between these two threat actors, as described in a blog post by Check Point Research, is strategic and leverages each group’s strengths. Scarred Manticore specializes in discreet spying using its Liontail malware framework for email data exfiltration over extended periods. On the other hand, Void Manticore is more aggressive, using hacktivist personas like Homeland Justice and Karma for its operations in Albania and Israel, respectively.

Void Manticore’s tactics include using basic tools like remote desktop protocol (RDP) for lateral movement and the reGeorg Web shell to infiltrate an organization’s files before causing havoc. The group also possesses custom wipers designed to corrupt specific files or target the partition table, rendering data on the disk inaccessible.

Defending against two distinct threat actors with varying tools, infrastructure, and techniques can pose a challenge for targeted organizations. In light of this new phenomenon, experts suggest focusing on the more sophisticated threat actor, Scarred Manticore, due to the extended timeline of espionage campaigns compared to destructive ones. Organizations are advised to act swiftly upon detecting the presence of the destructive actor, as they tend to move quickly once granted network access.

Simple defenses, such as robust endpoint security, can help block Void Manticore’s straightforward tactics. Additionally, early intervention to prevent Scarred Manticore’s attacks, which often exploit known vulnerabilities like CVE-2019-0604 in Microsoft Sharepoint, can thwart their espionage efforts. Preventative measures can significantly reduce the risk posed by these Iranian state-backed threat actors.

As the cybersecurity landscape continues to evolve, organizations must remain vigilant and proactively implement defense strategies to safeguard against sophisticated threat actors like Scarred Manticore and Void Manticore. By staying informed and adopting best practices in cybersecurity, companies can mitigate the potential impact of malicious activities orchestrated by state-sponsored adversaries.

Source link

Latest articles

AI Governance Requires Distinct Models for Internal and External Agents

The Evolving Landscape of AI: Blurring the Line Between Internal and Customer-Facing Capabilities As the...

Windows 11 23H2 to 25H2 Upgrade Reportedly Causes Internet Connectivity Issues for Users

Critical Bug in Windows 11 Upgrades Disrupts Wired Network Authentication A significant and persistent bug...

Why Workforce Identity Remains a Vulnerability and How to Address It

The Illusion of Control in Workforce Identity Management Many organizations operate under the assumption that...

Half of US CISOs Work the Equivalent of a Six-Day Week

Cybersecurity Leaders Face Mounting Challenges Amidst Escalating Threats In the rapidly evolving landscape of cybersecurity,...

More like this

AI Governance Requires Distinct Models for Internal and External Agents

The Evolving Landscape of AI: Blurring the Line Between Internal and Customer-Facing Capabilities As the...

Windows 11 23H2 to 25H2 Upgrade Reportedly Causes Internet Connectivity Issues for Users

Critical Bug in Windows 11 Upgrades Disrupts Wired Network Authentication A significant and persistent bug...

Why Workforce Identity Remains a Vulnerability and How to Address It

The Illusion of Control in Workforce Identity Management Many organizations operate under the assumption that...