- Join BJ's Wholesale Club for just $20 right now to save on holiday shopping
- This $28 'magic arm' makes taking pictures so much easier (and it's only $20 for Black Friday)
- Two free ways to get a Perplexity Pro subscription for one year
- The 40+ best Black Friday PlayStation 5 deals 2024: Deals available now
- The 25+ best Black Friday Nintendo Switch deals 2024
Hamas Cyberspies Return With New Malware After Exposure of Operations
A cyberespionage group linked in the past to the Palestinian terrorist organization Hamas took a break after its operations were exposed last summer and returned with new tools and techniques.
According to enterprise security firm Proofpoint, the threat actor known as Molerats apparently took a short break after the company released information on its activities in June 2021. During that break, it updated its malware and delivery mechanisms.
Molerats has been active since at least 2011 and it focuses on the Middle East. It’s also tracked as Gaza Hackers Team, Gaza Cybergang, DustySky, Extreme Jackal, Moonlight and TA402 — some researchers believe there are multiple groups operating under the same umbrella.
It’s worth noting that Molerats’ operations are often exposed by cybersecurity firms and researchers, but that does not appear to have discouraged the threat actor. In 2019, Kaspersky even managed to disrupt a significant part of the infrastructure used by the cyberspies and, in the same year, Israel claimed to have bombed a building housing Hamas cyber operatives in response to a cyberattack.
In a blog post published on Tuesday, Proofpoint said the hackers have apparently replaced an implant named LastConn with a new one that the cybersecurity firm has dubbed NimbleMamba. The malware was used in late 2021 in attacks aimed at Middle Eastern entities, including governments, foreign policy think tanks, and a state-affiliated airline.
Proofpoint researchers found that while NimbleMamba and LastConn have some similarities, there is little overlap between the two when it comes to code.
“NimbleMamba has the traditional capabilities of an intelligence-gathering trojan and is likely designed to be the initial access. Functionalities include capturing screenshots and obtaining process information from the computer. Additionally, it can detect user interaction, such as looking for mouse movement,” Proofpoint explained.
The malware has been delivered both via malicious websites and Dropbox — the file sharing service has also been abused for command and control (C&C) and file exfiltration. Researchers also found that NimbleMamba uses “guardrails” to ensure that it only infects devices in specified countries in the Middle East and Africa.
“The malware also contains multiple capabilities designed to complicate both automated and manual analysis,” researchers said. “Based on this, Proofpoint assesses NimbleMamba is actively being developed, is well-maintained, and designed for use in highly targeted intelligence collection campaigns.”
Recently, Zscaler also published a report on new espionage operations conducted by Molerats, targeting the banking sector in Palestine, individuals related to Palestinian political parties, as well as human rights activists and journalists in Turkey. Proofpoint believes the attacks it has analyzed occurred concurrently to the activity detailed by Zscaler.
Related: APT Group Using Voice Changing Software in Spear-Phishing Campaign
Related: New Backdoors Used by Hamas-Linked Hackers Abuse Facebook, Dropbox
Related: Hamas-Linked Hackers Add Insurance and Retail to Target List
Related: New Backdoor Attacks Leverage Political Turmoil in Middle East