threat alerts molerats & pierogis alerts/threat alert molerats and...

1
WHAT’S HAPPENING? The Cybereason Nocturnus team has discovered several recent, targeted attacks in the Middle East. These attacks deliver the Spark and Pierogi backdoors for politically-driven cyber espionage operations using spear phishing attacks. KEY OBSERVATIONS & TTPS » Targeting Palestinians: The campaigns seems to target Palestinian individuals and entities, likely related to the Palesitinian government. » Politically-motivated APT: Cybereason suspects that the objective of the threat actor is to obtain sensitive information from the victims and leverage it for political purposes. » Lured Into Deploying a Backdoor: The attackers use specially crafted lure content for spear phishing to trick targets into opening malicious files that infect the victim’s machine with a backdoor. The lure content in the malicious files relates to political affairs in the Middle East, with references to the Israeli-Palesitinian conflict, tension between Hamas and Fatah, and other political entities. » Perpetrated by an Arabic-Speaking APT Group: The modus-operandi of the attackers in conjunction with the social engineering tactics and decoy content seem aligned with previous attacks carried out by the Arabic-speaking APT group MoleRATs (aka Gaza Cybergang). This group has been operating in the Middle East since 2012. » Read the full length research here. CYBEREASON CUSTOMERS We highly recommend every customer enable the following features: » If you do not have Cybereason NGAV activated, consider doing so to prevent against threats like these. » For Cybereason MDR customers, the Cybereason team will monitor and triage as well as assist in the mitigation of potential infections. THREAT TYPE: BACKDOOR TARGET INDUSTRY: GOVERNMENT ENTITIES ATTACK GOAL: CYBER ESPIONAGE IMPACTED GEO: THE MIDDLE EAST OVERVIEW Consider social engineering awareness and training, which are key in preventing such attacks. Disable macros and install an endpoint protection solution to help mitigate similar attacks. REMEDIATION STEPS CYBEREASON.COM EXPERIENCED A BREACH? EMAIL US AT PREVENTED & DETECTED BY THE CYBEREASON DEFENSE PLATFORM [email protected] MOLERATS & PIEROGIS THREAT ALERTS

Upload: others

Post on 06-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: THREAT ALERTS MOLERATS & PIEROGIS Alerts/Threat Alert MoleRATs and Pierogis.pdfpolitically-driven cyber espionage operations using spear phishing attacks. KEY OBSERVATIONS & TT PS

WHAT ’S HAPPENING? The Cybereason Nocturnus team has discovered several recent, targeted attacks

in the Middle East. These attacks deliver the Spark and Pierogi backdoors for

politically-driven cyber espionage operations using spear phishing attacks.

KEY OBSER VATIONS & T TPS » Targeting Palestinians: The campaigns seems to target Palestinian individuals

and entities, likely related to the Palesitinian government.

» Politically-motivated APT: Cybereason suspects that the objective of the threat

actor is to obtain sensitive information from the victims and leverage it for

political purposes.

» Lured Into Deploying a Backdoor: The attackers use specially crafted lure content

for spear phishing to trick targets into opening malicious files that infect the

victim’s machine with a backdoor. The lure content in the malicious files relates

to political affairs in the Middle East, with references to the Israeli-Palesitinian

conflict, tension between Hamas and Fatah, and other political entities.

» Perpetrated by an Arabic-Speaking APT Group: The modus-operandi of the

attackers in conjunction with the social engineering tactics and decoy content

seem aligned with previous attacks carried out by the Arabic-speaking APT group

MoleRATs (aka Gaza Cybergang). This group has been operating in the Middle East

since 2012.

» Read the full length research here.

CYBEREASON CUSTOMERS

We highly recommend every customer enable the following features:

» If you do not have Cybereason NGAV activated, consider doing so to prevent

against threats like these.

» For Cybereason MDR customers, the Cybereason team will monitor

and triage as well as assist in the mitigation of potential infections.

T H R E AT T Y P E : BACKDOOR

TA R G E T I N D U S T R Y: GOVERNMENT ENTITIES

AT TAC K G OA L : CYBER ESPIONAGE

I M PAC T E D G E O : T H E MIDDLE EAST

O V E R V I E W

Consider social engineering awareness and training, which are key in preventing such attacks.

Disable macros and install an endpoint protection solution to help mitigate similar attacks.

R E M E D I AT I O N S T E P S

C Y B E R E A S O N . C O M

EXPERIENCED A BREACH?

EMAIL US AT

P R E V E N T E D & D E T E C T E D BY

T H E C Y B E R E A S O N D E F E N S E P L AT F O R M

I N F O @ C Y B E R E A S O N . C O M

MOLERATS & PIEROGISTHREAT ALERTS