Attacks/Breaches

10/30/2017
06:30 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Gaza Cybergang Acquires New Tools, Expands Operations

Warning from Kaspersky Lab second in recent month involving heightened threat activity in Middle East and North Africa.

Cyber threat activity in the Middle East and North Africa (MENA) appears to be ramping up.

Gaza Cybergang, a threat actor that has been targeting organizations in the MENA region since at least 2012, has added new malicious tools to its cyber arsenal, Kaspersky Lab warned Monday.

Among the new tools are exploits for a fairly recent vulnerability in Microsoft Access (CVE 2017-0199), at least one Android spyware sample, and spearphishing documents with highly topical geopolitical messages for delivering malware to targets.

Gaza Cybergang has continuously attacked government organizations, oil and gas companies, embassies, diplomatic staff and media in the MENA region for the past several years and recently appears to have expanded its operations there, Kaspersky Lab said.

Now the focus appears to be on gathering any type of intelligence across the Middle East and North Africa, which was not the case previously, the vendor noted. One of the group's latest victims is an oil and gas company that appears to have been infiltrated more than a year ago.

The Kaspersky Lab report is the second warning in recent weeks that involves a threat actor in the Middle East and North Africa and suggests that cyber criminal activity in the region is accelerating.

In September, Palo Alto Networks warned about a massive adversary infrastructure it had discovered that is being used to target government and private organizations, including those in critical sectors, across the Middle East and North Africa. Palo Alto Networks had described the threat campaign it discovered as having links to another campaign involving OilRig, a malware tool that has been used to steal data from government, airline, financial services, and other organizations in Saudi Arabia.

A lot of the activty is being fueled by what Trend Micro recently described as a thriving cybercrime underground market that provides threat actors in the MENA region with easy - and often free - access to sophisticated malware tools.

According to Kaspersky Lab, the Gaza Cybergang has been using spearphishing emails with malware-laced attachments and download-links to infect target systems.  

Starting around March this year, the group has also begun using Microsoft Access documents with embedded macros to take control of systems and infect them with malware for logging keystrokes, stealing files, and taking screenshots on victim devices. The exploit for the Microsoft Access vulnerability has given the attackers direct code execution abilities from Microsoft Office documents on non-patched systems, Kaspersky Lab said.

The Gaza Cybergang has increasingly begun using local incidents with geopolitical or humanitarian implications to craft its spearphishing emails. Examples of recent lures have included emails with subjects pertaining to the Palestinian government not paying salaries to Gaza employees, the political crisis in Qatar, and news about a hunger strike by Palestinian prisoners in Israeli jails.

Some of the files that Kaspersky Lab has investigated suggest that the Gaza Cybergang may have an Android Trojan in their toolkit as well, the company said. The new tools have equipped the threat actor with the ability to bypass many current security products and remain persistent on a victim's network for a prolonged period.

"Due to significant improvements in the group’s techniques, we expect the quantity and quality of Gaza Cybergang attacks to intensify in the near future," Kaspersky Lab said. "People and organizations that fall into their target scope should be more cautious when online.”

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.