Article Details

Scrape Timestamp (UTC): 2023-11-06 10:35:03.095

Source: https://thehackernews.com/2023/11/iranian-hackers-launches-destructive.html

Original Article Text

Click to Toggle View

Iranian Hackers Launches Destructive Cyberattacks on Israeli Tech and Education Sectors. Israeli higher education and tech sectors have been targeted as part of a series of destructive cyber attacks that commenced in January 2023 with an aim to deploy previously undocumented wiper malware. The intrusions, which took place as recently as October, have been attributed to an Iranian nation-state hacking crew it tracks under the name Agonizing Serpens, which is also known as Agrius, BlackShadow and Pink Sandstorm (previously Americium). "The attacks are characterized by attempts to steal sensitive data, such as personally identifiable information (PII) and intellectual property," Palo Alto Networks Unit 42 said in a new report shared with The Hacker News. "Once the attackers stole the information, they deployed various wipers intended to cover the attackers' tracks and to render the infected endpoints unusable." This includes three different novel wipers such as MultiLayer, PartialWasher, and BFG Agonizer, as well as a bespoke tool to extract information from database servers known as Sqlextractor. Active since at least December 2020, Agonizing Serpens has been linked to wiper attacks targeting Israeli entities. Earlier this May, Check Point detailed the threat actor's use of a ransomware strain called Moneybird in its attacks targeting the country. The latest set of attacks entails weaponizing vulnerable internet facing web servers as initial access routes to deploy web shells and conduct reconnaissance of the victim networks and steal credentials of users with administrative privileges. A lateral movement phase is followed by data exfiltration using a mix of public and custom tools like Sqlextractor, WinSCP, and PuTTY, and finally deliver the wiper malware - The links to Agrius stems from multiple code overlaps with other malware families like Apostle, IPsec Helper, and Fantasy, which have been identified as previously used by the group. "It appears that the Agonizing Serpens APT group has recently upgraded their capabilities and they are investing great efforts and resources to attempt to bypass EDR and other security measures," Unit 42 researchers said. "To do so, they have been rotating between using different known proof-of-concept (PoC) and pentesting tools as well as custom tools."

Daily Brief Summary

NATION STATE ACTIVITY // Iranian Hackers Target Israeli Tech and Education Sectors with Wiper Malware

Iranian hacker group Agonizing Serpens, also known as Agrius, BlackShadow, and Pink Sandstorm, has been carrying out a series of cyber attacks on Israel's higher education and tech sectors since January 2023.

The attacks aim to steal sensitive data such as personally identifiable information (PII) and intellectual property; once the information is stolen, the attackers deploy various wiper malware to cover their tracks and render the infected endpoints unusable.

Three new types of wipers

MultiLayer, PartialWasher, and BFG Agonizer

were used, as well as a tool called Sqlextractor, used to extract information from database servers.

Agonizing Serpens, active since at least December 2020, has been linked to previous attacks on Israeli entities using a ransomware strain called Moneybird.

The recent attacks have weaponized vulnerable internet-facing web servers, deploying web shells and stealing user access credentials for further internal network exploration.

The attackers use a mix of public and custom tools like Sqlextractor, WinSCP, and PuTTY to exfiltrate data and deliver wiper malware.

Agonizing Serpens has recently upgraded their capabilities and invested resources to attempt to bypass Endpoint Detection and Response (EDR) and other security measures, often rotating between different known proof-of-concept (PoC) and penetration testing tools, as well as custom tools.