Attacks/Breaches

10/30/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Gaza Cybergang Acquires New Tools, Expands Operations

Warning from Kaspersky Lab second in recent month involving heightened threat activity in Middle East and North Africa.

Cyber threat activity in the Middle East and North Africa (MENA) appears to be ramping up.

Gaza Cybergang, a threat actor that has been targeting organizations in the MENA region since at least 2012, has added new malicious tools to its cyber arsenal, Kaspersky Lab warned Monday.

Among the new tools are exploits for a fairly recent vulnerability in Microsoft Access (CVE 2017-0199), at least one Android spyware sample, and spearphishing documents with highly topical geopolitical messages for delivering malware to targets.

Gaza Cybergang has continuously attacked government organizations, oil and gas companies, embassies, diplomatic staff and media in the MENA region for the past several years and recently appears to have expanded its operations there, Kaspersky Lab said.

Now the focus appears to be on gathering any type of intelligence across the Middle East and North Africa, which was not the case previously, the vendor noted. One of the group's latest victims is an oil and gas company that appears to have been infiltrated more than a year ago.

The Kaspersky Lab report is the second warning in recent weeks that involves a threat actor in the Middle East and North Africa and suggests that cyber criminal activity in the region is accelerating.

In September, Palo Alto Networks warned about a massive adversary infrastructure it had discovered that is being used to target government and private organizations, including those in critical sectors, across the Middle East and North Africa. Palo Alto Networks had described the threat campaign it discovered as having links to another campaign involving OilRig, a malware tool that has been used to steal data from government, airline, financial services, and other organizations in Saudi Arabia.

A lot of the activty is being fueled by what Trend Micro recently described as a thriving cybercrime underground market that provides threat actors in the MENA region with easy - and often free - access to sophisticated malware tools.

According to Kaspersky Lab, the Gaza Cybergang has been using spearphishing emails with malware-laced attachments and download-links to infect target systems.  

Starting around March this year, the group has also begun using Microsoft Access documents with embedded macros to take control of systems and infect them with malware for logging keystrokes, stealing files, and taking screenshots on victim devices. The exploit for the Microsoft Access vulnerability has given the attackers direct code execution abilities from Microsoft Office documents on non-patched systems, Kaspersky Lab said.

The Gaza Cybergang has increasingly begun using local incidents with geopolitical or humanitarian implications to craft its spearphishing emails. Examples of recent lures have included emails with subjects pertaining to the Palestinian government not paying salaries to Gaza employees, the political crisis in Qatar, and news about a hunger strike by Palestinian prisoners in Israeli jails.

Some of the files that Kaspersky Lab has investigated suggest that the Gaza Cybergang may have an Android Trojan in their toolkit as well, the company said. The new tools have equipped the threat actor with the ability to bypass many current security products and remain persistent on a victim's network for a prolonged period.

"Due to significant improvements in the group’s techniques, we expect the quantity and quality of Gaza Cybergang attacks to intensify in the near future," Kaspersky Lab said. "People and organizations that fall into their target scope should be more cautious when online.”

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Are you sure this is how we get our data into the cloud?
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-8298
PUBLISHED: 2018-09-24
Multiple SQL injection vulnerabilities in the login page in RXTEC RXAdmin UPDATE 06 / 2012 allow remote attackers to execute arbitrary SQL commands via the (1) loginpassword, (2) loginusername, (3) zusatzlicher, or (4) groupid parameter to index.htm, or the (5) rxtec cookie to index.htm.
CVE-2018-14825
PUBLISHED: 2018-09-24
A skilled attacker with advanced knowledge of the target system could exploit this vulnerability by creating an application that would successfully bind to the service and gain elevated system privileges. This could enable the attacker to obtain access to keystrokes, passwords, personal identifiable...
CVE-2018-17437
PUBLISHED: 2018-09-24
Memory leak in the H5O_dtype_decode_helper() function in H5Odtype.c in the HDF HDF5 through 1.10.3 library allows attackers to cause a denial of service (memory consumption) via a crafted HDF5 file.
CVE-2018-17438
PUBLISHED: 2018-09-24
A SIGFPE signal is raised in the function H5D__select_io() of H5Dselect.c in the HDF HDF5 through 1.10.3 library during an attempted parse of a crafted HDF file, because of incorrect protection against division by zero. It could allow a remote denial of service attack.
CVE-2018-17439
PUBLISHED: 2018-09-24
An issue was discovered in the HDF HDF5 1.10.3 library. There is a stack-based buffer overflow in the function H5S_extent_get_dims() in H5S.c. Specifically, this issue occurs while converting an HDF5 file to a GIF file.