• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
gaza linked cyber threat actor targets israeli energy and defense sectors

Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors

You are here: Home / General Cyber Security News / Gaza-Linked Cyber Threat Actor Targets Israeli Energy and Defense Sectors
October 9, 2023

A Gaza-primarily based risk actor has been connected to a series of cyber attacks aimed at Israeli non-public-sector strength, protection, and telecommunications businesses.

Microsoft, which revealed details of the activity in its fourth once-a-year Electronic Defense Report, is monitoring the campaign less than the identify Storm-1133.

“We evaluate this group performs to further the pursuits of Hamas, a Sunni militant team that is the de facto governing authority in the Gaza Strip, as exercise attributed to it has mostly influenced corporations perceived as hostile to Hamas,” the business claimed.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Targets of the campaign involved organizations in the Israeli strength and defense sectors and entities faithful to Fatah, a Palestinian nationalist and social democratic political party headquartered in the West Bank location.

Cybersecurity

Attack chains entail a blend of social engineering and bogus profiles on LinkedIn that masquerade as Israeli human means supervisors, undertaking coordinators, and software developers to get hold of and ship phishing messages, perform reconnaissance, produce malware to workers at Israeli businesses.

Microsoft explained it also observed Storm-1133 making an attempt to infiltrate 3rd-party companies with community ties to Israeli targets of fascination.

These intrusions are created to deploy backdoors, alongside a configuration that makes it possible for the group to dynamically update the command-and-control (C2) infrastructure hosted on Google Travel.

“This technique permits operators to stay a move ahead of selected static network-primarily based defenses,” Redmond famous.

Cybersecurity

The enhancement comes as nation-condition threats have shifted away from damaging and disruptive operations to extensive-phrase espionage strategies, with the U.S., Ukraine, Israel, and South Korea emerging as some of the most qualified nations in Europe, Center East and North Africa (MENA), and Asia-Pacific regions.

“Iranian and North Korean condition actors are demonstrating improved sophistication in their cyber functions, in some cases starting to near the hole with country-point out cyber actors such as Russia and China,” the tech large said.

This evolving tradecraft is evidenced by the recurring use of customized tools and backdoors – e.g., MischiefTut by Mint Sandstorm (aka Charming Kitten) – to facilitate persistence, detection evasion, and credential theft.

Uncovered this report attention-grabbing? Comply with us on Twitter  and LinkedIn to read through a lot more special information we put up.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «north korea's lazarus group launders $900 million in cryptocurrency North Korea’s Lazarus Group Launders $900 Million in Cryptocurrency
Next Post: Security Patch for Two New Flaws in Curl Library Arriving on October 11 security patch for two new flaws in curl library arriving»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.