• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hamas linked cyberattacks using rust powered sysjoker backdoor against israel

Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel

You are here: Home / General Cyber Security News / Hamas-Linked Cyberattacks Using Rust-Powered SysJoker Backdoor Against Israel
November 24, 2023

Cybersecurity researchers have get rid of light-weight on a Rust variation of a cross-system backdoor identified as SysJoker, which is assessed to have been applied by a Hamas-affiliated risk actor to target Israel amid the ongoing war in the location.

“Among the most distinguished alterations is the shift to Rust language, which signifies the malware code was completely rewritten, even though even now keeping very similar functionalities,” Test Stage reported in a Wednesday evaluation. “In addition, the risk actor moved to employing OneDrive as an alternative of Google Drive to store dynamic C2 (command-and-manage server) URLs.”

SysJoker was publicly documented by Intezer in January 2022, describing it as a backdoor able of gathering program details and creating get hold of with an attacker-managed server by accessing a textual content file hosted on Google Travel that has a challenging-coded URL.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

“Remaining cross-platform will allow the malware authors to gain gain of wide infection on all main platforms,” VMware explained very last yr. “SysJoker has the skill to execute instructions remotely as perfectly as obtain and execute new malware on victim equipment.”

The discovery of a Rust variant of SysJoker points to an evolution of the cross-system risk, with the implant using random rest intervals at different stages of its execution, most likely in an effort and hard work to evade sandboxes.

A person noteworthy change is the use of OneDrive to retrieve the encrypted and encoded C2 server handle, which is subsequently parsed to extract the IP tackle and port to be employed.

“Working with OneDrive permits the attackers to simply transform the C2 address, which permits them to remain ahead of diverse track record-dependent products and services,” Examine Position stated. “This habits stays consistent across diverse variations of SysJoker.”

Immediately after establishing connections with the server, the artifact awaits even more more payloads that are then executed on the compromised host.

The cybersecurity firm stated it also found two in no way-before-viewed SysJoker samples made for Windows that are considerably more complex, a person of which using a multi-stage execution course of action to start the malware.

Cybersecurity

SysJoker has not but been formally attributed to any menace actor or group. But newly collected evidence displays overlaps concerning the backdoor and malware samples made use of in link with Procedure Electric Powder, which refers to a qualified campaign from Israeli companies involving April 2016 and February 2017.

This activity was joined by McAfee to a Hamas-affiliated danger actor known as Molerats (aka Excessive Jackal, Gaza Cyber Gang, and TA402).

“Both strategies utilized API-themed URLs and carried out script instructions in a related vogue,” Verify Level observed, increasing the possibility that “the identical actor is responsible for both equally attacks, despite the large time gap concerning the functions.”

Located this report interesting? Adhere to us on Twitter  and LinkedIn to read much more exclusive information we article.


Some elements of this write-up are sourced from:
thehackernews.com

Previous Post: «kubernetes secrets of fortune 500 companies exposed in public repositories Kubernetes Secrets of Fortune 500 Companies Exposed in Public Repositories
Next Post: Tell Me Your Secrets Without Telling Me Your Secrets tell me your secrets without telling me your secrets»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.