Article Details

Scrape Timestamp (UTC): 2023-10-09 12:26:13.422

Source: https://thehackernews.com/2023/10/gaza-linked-cyber-threat-actor-targets.html

Original Article Text

Click to Toggle View

Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors. A Gaza-based threat actor has been linked to a series of cyber attacks aimed at Israeli private-sector energy, defense, and telecommunications organizations. Microsoft, which revealed details of the activity in its fourth annual Digital Defense Report, is tracking the campaign under the name Storm-1133. "We assess this group works to further the interests of Hamas, a Sunni militant group that is the de facto governing authority in the Gaza Strip, as activity attributed to it has largely affected organizations perceived as hostile to Hamas," the company said. Targets of the campaign included organizations in the Israeli energy and defense sectors and entities loyal to Fatah, a Palestinian nationalist and social democratic political party headquartered in the West Bank region. Attack chains entail a mix of social engineering and fake profiles on LinkedIn that masquerade as Israeli human resources managers, project coordinators, and software developers to contact and send phishing messages, conduct reconnaissance, deliver malware to employees at Israeli organizations. Microsoft said it also observed Storm-1133 attempting to infiltrate third-party organizations with public ties to Israeli targets of interest. These intrusions are designed to deploy backdoors, alongside a configuration that allows the group to dynamically update the command-and-control (C2) infrastructure hosted on Google Drive. "This technique enables operators to stay a step ahead of certain static network-based defenses," Redmond noted. The disclosure overlaps with an escalation in the Israeli-Palestinian conflict, which has been accompanied by a surge in malicious hacktivist operations such as Ghosts of Palestine that aim to bring down government websites and IT systems in Israel, the U.S., and India. "Around 70 incidents where Asian hacktivist groups are actively targeting nations like Israel, India, and even France, primarily due to their alignment with the U.S.," Falconfeeds.io said in a post shared on X (formerly Twitter). The development also comes as nation-state threats have shifted away from destructive and disruptive operations to long-term espionage campaigns, with the U.S., Ukraine, Israel, and South Korea emerging as some of the most targeted nations in Europe, Middle East and North Africa (MENA), and Asia-Pacific regions. "Iranian and North Korean state actors are demonstrating increased sophistication in their cyber operations, in some cases starting to close the gap with nation-state cyber actors such as Russia and China," the tech giant said. This evolving tradecraft is evidenced by the recurring use of custom tools and backdoors – e.g., MischiefTut by Mint Sandstorm (aka Charming Kitten) – to facilitate persistence, detection evasion, and credential theft.

Daily Brief Summary

NATION STATE ACTIVITY // Gaza-linked Cyber Actors Target Israeli Energy and Defense Sectors

Microsoft's fourth annual Digital Defense Report has revealed a series of cyber attacks aimed at Israeli interests, specifically in the private-sector energy, defense, and telecommunications organizations. The campaign is being tracked by Microsoft under the title Storm-1133.

The cyber threat actor is thought to be operating out of Gaza and is believed to be working in the interests of Hamas. The targeted organizations are perceived as hostile to Hamas.

The attack chain involves a combination of social engineering and fake LinkedIn profiles, posing as human resources managers, project coordinators, and software developers affiliated with Israeli organizations. They use these profiles to send phishing messages, conduct reconnaissance, and deliver malware to employees.

Microsoft has also observed efforts by Storm-1133 to infiltrate third-party organizations with public connections to potential targets in Israel. These intrusions are designed to deploy backdoors and provide the group with constant updates to its command-and-control infrastructure, which is hosted on Google Drive.

These cyber activities coincide with an escalation in the Israeli-Palestinian conflict and an increase in malicious hacktivist operations aiming to disrupt government websites and IT systems in Israel, the U.S., and India. Asian hacktivist groups are increasingly active, with around 70 incidents reported so far.

Microsoft has noted a shift from destructive operations to long-term espionage campaigns amongst nation-state threats. The most targeted countries include the U.S., Ukraine, Israel, and South Korea. Iranian and North Korean state actors are showing increasing sophistication in their cyber operations, narrowing the capability gap with nation-state cyber actors from Russia and China.