Hacker Group 'Moses Staff' Using New StrifeWater RAT In Ransomware Attacks

 


A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.

Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."

"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."

Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.

The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.


To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.

The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.

The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.

StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.

"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."

Related articles

  1. Pentest Tools Free
  2. Best Pentesting Tools 2018
  3. Hacking Tools For Games
  4. Github Hacking Tools
  5. Pentest Tools Review
  6. Pentest Tools Url Fuzzer
  7. Pentest Tools Kali Linux
  8. Pentest Tools Open Source
  9. Hack Tools For Ubuntu
  10. Hacker Security Tools
  11. Hack And Tools
  12. Hack Tools Online
  13. Hacking Tools Name
  14. Hacker Tools Mac
  15. Pentest Tools Review
  16. Pentest Tools Free
  17. Hack Tool Apk No Root
  18. Hacking Tools Name
  19. Black Hat Hacker Tools
  20. Hack Tools
  21. Hacking Tools
  22. Hacking Tools Software
  23. Hack Apps
  24. Hacking Tools Software
  25. Pentest Tools Android
  26. Bluetooth Hacking Tools Kali
  27. Hacker Tools For Windows
  28. Hack Tools For Pc
  29. Pentest Tools Bluekeep
  30. Hacking Tools For Windows 7
  31. Pentest Tools Github
  32. Hacking Apps
  33. Hack Tools Github
  34. Hacking Tools For Windows 7
  35. Hack Tools For Windows
  36. Hack Tools For Games
  37. Best Hacking Tools 2019
  38. Hacking Tools For Windows 7
  39. Pentest Tools Find Subdomains
  40. Best Hacking Tools 2020
  41. Hacker Tools List
  42. New Hack Tools
  43. Usb Pentest Tools
  44. Hacker
  45. Hacker Tool Kit
  46. Pentest Tools Subdomain
  47. Physical Pentest Tools
  48. Hacker Tools List
  49. Hacker Tools Linux
  50. Hacking Tools And Software
  51. Hacker Tools Software
  52. Android Hack Tools Github
  53. Hacker Tools
  54. Hacking Tools Name
  55. Pentest Tools Apk
  56. Pentest Tools Website
  57. How To Make Hacking Tools
  58. Hack Tools For Ubuntu
  59. Hack Tools For Mac
  60. Hack Tools Github

No hay comentarios:

Publicar un comentario