Gaza-Linked Cyber Threat actor targets Israeli energy and defense sectors

A Gaza-based threat actor has been linked to a series of cyber attacks aimed at the purpose of Israeli’s private sector energy, defense and telecom organizations.

Microsoft, who revealed the details of the activity in his fourth annual digital defense report, is monitoring the campaign under the name Storm -1133.

“We Assess this group works to further the interests of Hamas, a Sunni Militant Group that is the de Facto Governing Authority in the Gaza Strip, As Activity Attributed to it has been concerned as Hostile to Hamas, “The company said.

The goals of the campaign included organizations in the Israeli energy and defense sector and were loyal to a Palestinian nationalist and loyal to the social democratic political party at the headquarters in the West Bank region.

Attack chains linked enter the mixture of social engineering and fake profiles, which are Israeli’s Human Resource Manager, Project Coordinator, and Software Developers and send phishing messages, operating, reconnaissance to employees in Israeli organizations to provide malware.

Microsoft said it also saw Storm -1133, which tries to infiltrate the third -party organizations with public relations for Israeli goals.

These intruders have been hosted on Google Drive to the backdoor, a configuration to update the infrastructure, a configuration as well as a group, command-and-control (C2).

“This technique enables operators to stay one step ahead of some static network-based defense,” said Redmond.

The disclosure overlaps with an increase in the Israeli-Palestinian conflict, which is accompanied by an increase in malicious hacktivist operations in ghosts such as Palestine, which aims to Israel, U.S. And to bring down government websites and IT systems in India.

“Around 70 events where the Asian Hacktivist groups are actively targeting nations like Israel, India and even France, mainly due to their alignment with the U.S.,” Falconfeeds.io East Said in a post shared on Twitter.

The development also comes as nation-state threats have shifted away from destructive and disruptive operations to long-term espionage campaigns, with the U.S., Ukraine, Israel, and South Korea emerging as some of the most targeted nations in Europe, Middle East and North Africa (MENA), and Asia-Pacific regions.

Tech giant said, “Iranian and North Korean state actor shows growing refinement in their cyber operations, in some cases the differences with national-state cyber actors like Russia and China began to shut down the difference.”

This is evident from the recurring use of developing tradecraft custom tools and backdoors – eg, to facilitate mischiefTut by Mint Sandstorm (aka attractive kitten) and theft by mint sandstorm .

Related posts

CISA and OpenSSF release framework for package repository security

Kimsuky’s New Golang Stealer ‘Troll’ and ‘GoBear’ Backdoor Targets South Korea

Critical JetBrains TeamCity on-Premises Flaw exposes servers to takeover – Patch Now

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More