Article Details
Scrape Timestamp (UTC): 2024-01-06 06:53:26.285
Source: https://thehackernews.com/2024/01/pro-iranian-hacker-group-targeting.html
Original Article Text
Click to Toggle View
Pro-Iranian Hacker Group Targeting Albania with No-Justice Wiper Malware. The recent wave of cyber attacks targeting Albanian organizations involved the use of a wiper called No-Justice. The findings come from cybersecurity company ClearSky, which said the Windows-based malware "crashes the operating system in a way that it cannot be rebooted." The intrusions have been attributed to an Iranian "psychological operation group" called Homeland Justice, which has been operating since July 2022, specifically orchestrating destructive attacks against Albania. On December 24, 2023, the adversary resurfaced after a hiatus, stating it's "back to destroy supporters of terrorists," describing its latest campaign as #DestroyDurresMilitaryCamp. The Albanian city of Durrës currently hosts the dissident group People's Mojahedin Organization of Iran (MEK). Targets of the attack included ONE Albania, Eagle Mobile Albania, Air Albania, and the Albanian parliament. Two of the primary tools deployed during the campaign include an executable wiper and a PowerShell script that's designed to propagate the former to other machines in the target network after enabling Windows Remote Management (WinRM). The No-Justice wiper (NACL.exe) is a 220.34 KB binary that requires administrator privileges to erase the data on the computer. This is accomplished by removing the boot signature from the Master Boot Record (MBR), which refers to the first sector of any hard disk that identifies where the operating system is located in the disk so that it can be loaded into a computer's RAM. Also delivered over the course of the attack are legitimate tools like Plink (aka PuTTY Link), RevSocks, and the Windows 2000 resource kit to facilitate reconnaissance, lateral movement, and persistent remote access. The development comes as pro-Iranian threat actors such as Cyber Av3ngers, Cyber Toufan, Haghjoyan, and YareGomnam Team have increasingly set their sights on Israel and the U.S. amid continuing geopolitical tensions in the Middle East. "Groups such as Cyber Av3ngers and Cyber Toufan appear to be adopting a narrative of retaliation in their cyber attacks," Check Point disclosed last month. "By opportunistically targeting U.S. entities using Israeli technology, these hacktivist proxies try to achieve a dual retaliation strategy – claiming to target both Israel and the U.S. in a single, orchestrated cyber assault." Cyber Toufan, in particular, has been linked to a deluge of hack-and-leak operations targeting over 100 organizations, wiping infected hosts and releasing stolen data on their Telegram channel. "They've caused so much damage that many of the orgs – almost a third, in fact, haven't been able to recover," security researcher Kevin Beaumont said. "Some of these are still fully offline over a month later, and the wiped victims are a mix of private companies and Israeli state government entities." Last month, the Israel National Cyber Directorate (INCD) said it's currently tracking roughly 15 hacker groups associated with Iran, Hamas, and Hezbollah that are maliciously operating in Israeli cyberspace since the onset of the Israel-Hamas war in October 2023. The agency further noted that the techniques and tactics employed share similarities with those used in the Ukraine-Russia war, leveraging psychological warfare and wiper malware to destroy information. The Ultimate Enterprise Browser Checklist Download a Concrete and Actionable Checklist for Finding a Browser Security Platform.
Daily Brief Summary
A pro-Iranian group called Homeland Justice used a wiper malware named No-Justice to target Albanian organizations, including ONE Albania and Eagle Mobile.
The cyberattacks were specifically directed at Albania after the group declared it would "destroy supporters of terrorists."
The No-Justice malware is configured to make the operating system unrecoverable by tampering with the Master Boot Record.
In the cyber campaign, a PowerShell script was deployed alongside the wiper for propagation within the network.
The attacks have raised concerns, given the increased activity of Iranian hacktivist proxies like Cyber Av3ngers and Cyber Toufan across Israel and the U.S.
These threat actors utilize double-retaliation strategies in their attacks, leveraging psychological warfare and targeting both Israeli and U.S. entities.
Despite the efforts to curb such threats, several organizations remain severely affected, with some still inoperable over a month after being attacked.
The Israel National Cyber Directorate is monitoring around 15 hacker groups exploiting Israeli cyberspace, employing tactics reminiscent of the cyber dimension of the Ukraine-Russia conflict.