Iran-linked hackers attack Israeli education and tech organizations

Siva Ramakrishnan
Hackers suspected of being tied to Iran’s government have been deploying new destructive malware against Israeli organizations, according to recent research.

Hackers suspected of being tied to Iran’s government have been deploying new destructive malware against Israeli organizations, according to recent research.

The attacks, attributed to an Iranian state-backed hacker group known as Agonizing Serpens, are part of a broader offensive campaign targeting Israel during its war with the Palestinian militant group Hamas, according to U.S. cybersecurity firm Palo Alto Networks.

The company said on Monday it had blocked a series of destructive cyberattacks on Israel that began in January and continued at least until October of this year, with the hackers primarily targeting educational and technology organizations.

The group was going after sensitive data, such as personally identifiable information and intellectual property. The attackers shared stolen information, including passport scans, emails, and victims’ full addresses, on social media and Telegram channels, likely to sow fear or inflict reputational damage, according to the research.

To cover their tracks and cause even more disruption, the hackers deployed wipers — a type of malware designed to delete or wipe out data.

Researchers have discovered three previously unknown wipers used in the latest attacks, including MultiLayer Wiper, PartialWasher, and BFG Agonizer Wiper, as well as a custom tool to extract information from database servers known as Sqlextractor.

Some of these tools have code similarities with other wipers previously used by Agonizing Serpens, while others were brand new. The overlaps between the tools may indicate that they share a codebase or were written by the same team of developers, according to the report.

To gain initial access to the victim’s environment, the group exploited vulnerable internet-facing web servers. To obtain credentials of users with administrative privileges, the attackers tried multiple methods. For example, they used Mimikatz, an exploit on Microsoft Windows that extracts passwords stored in memory.

Researchers said that Agonizing Serpens “is investing significant efforts and resources” trying to bypass security measures. This includes their practice of rotating between various known tools as well as custom-made tools.

Iranian hackers

Agonizing Serpens, also known as Agrius and BlackShadow, has been active since 2020. The group is known for its destructive wiper and fake ransomware attacks. Earlier in May, the hackers used a new ransomware strain called Moneybird in its attacks against Israeli organizations.

In the most recent attacks, the attackers did not demand a ransom; instead, the potential outcome of the attacks was significant data loss and disruptions to business continuity, researchers said.

Israel has been an attractive target for Iranian hackers recently. In late October, researchers detected a cyberattack on at least two Israeli entities by a long-running group connected to the Iranian government called MuddyWater.

Israel’s cyber defense chief told CNN that he’s “very concerned” that Iran could escalate its cyberattacks on the country’s infrastructure amid the Israeli-Palestinian war.

Iran, whose support for Hamas is driven by shared anti-Israel and anti-Western sentiments, can use cyberattacks to project power, as it can act more freely in cyberspace than in physical space, according to Gaby Portnoy, the head of the Israel National Cyber Directorate.

So far, suspected Iranian cyberattacks appear to have had minimal impact on their publicly claimed targets in Israel, according to Portnoy.

Portnoy said they want to keep cyberspace from becoming “another front” in the war with Hamas.

CybercrimeGovernmentNation-stateNews
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Daryna Antoniuk
is a freelance reporter for Recorded Future News based in Ukraine. She writes about cybersecurity startups, cyberattacks in Eastern Europe and the state of the cyberwar between Ukraine and Russia. She previously was a tech reporter for Forbes Ukraine. Her work has also been published at Sifted, The Kyiv Independent and The Kyiv Post.

 

Total
0
Shares
Leave a Reply

Your email address will not be published. Required fields are marked *

Previous Post

North Korean ‘BlueNoroff’ group targeting financial institutions with macOS malware

Next Post

Chinese APT groups target dozens of Cambodian government orgs

Related Posts

DarkGate Malware Replaces AutoIt with AutoHotkey in Latest Cyber Attacks

Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey mechanism to deliver the last stages, underscoring continued efforts on the part of the threat actors to continuously stay ahead of the detection curve. The updates have been observed in version 6 of DarkGate released in March 2024 by its developer RastaFarEye, who
Avatar
Read More

Expert-Led Webinar – Uncovering Latest DDoS Tactics and Learn How to Fight Back

In today's rapidly evolving digital landscape, the threat of Distributed Denial of Service (DDoS) attacks looms more significant than ever. As these cyber threats grow in sophistication, understanding and countering them becomes crucial for any business seeking to protect its online presence. To address this urgent need, we are thrilled to announce our upcoming webinar, "Uncovering Contemporary
Avatar
Read More