• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian agrius hackers targeting israeli organizations with moneybird ransomware

Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware

You are here: Home / General Cyber Security News / Iranian Agrius Hackers Targeting Israeli Organizations with Moneybird Ransomware
May 25, 2023

The Iranian danger actor recognized as Agrius is leveraging a new ransomware strain named Moneybird in its attacks targeting Israeli businesses.

Agrius, also recognised as Pink Sandstorm (formerly Americium), has a monitor history of staging destructive info-wiping attacks aimed at Israel underneath the guise of ransomware bacterial infections.

Microsoft has attributed the threat actor to Iran’s Ministry of Intelligence and Security (MOIS), which also operates MuddyWater. It is really recognised to be active due to the fact at the very least December 2020.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


In December 2022, the hacking crew was attributed to a established of tried disruptive intrusions that had been directed in opposition to diamond industries in South Africa, Israel, and Hong Kong.

These attacks included the use of a .NET-based mostly wiper-turned-ransomware termed Apostle and its successor acknowledged as Fantasy. In contrast to Apostle, Moneybird is programmed in C++.

“The use of a new ransomware, written in C++, is noteworthy, as it demonstrates the group’s expanding capabilities and ongoing hard work in building new equipment,” Examine Level researchers Marc Salinas Fernandez and Jiri Vinopal stated.

The an infection sequence starts with the exploitation of vulnerabilities within internet-exposed web servers, top to the deployment of a web shell referred to as ASPXSpy.

Moneybird Ransomware

In the subsequent actions, the web shell is made use of as a conduit to provide publicly-acknowledged tools in order to conduct reconnaissance of the victim atmosphere, shift laterally, harvest credentials, and exfiltrate knowledge.

Also executed on the compromised host is the Moneybird ransomware, which is engineered to encrypt delicate data files in the “F:Consumer Shares” folder and fall a ransom be aware urging the company to contact them within 24 several hours or risk receiving their stolen information and facts leaked.

“The use of a new ransomware demonstrates the actor’s more initiatives to enhance capabilities, as perfectly as hardening attribution and detection attempts,” the scientists claimed. “In spite of these new ‘covers,’ the team carries on to comply with its common behavior and benefit from identical instruments and tactics as prior to.”

Forthcoming WEBINARZero Belief + Deception: Master How to Outsmart Attackers!

Find how Deception can detect highly developed threats, end lateral movement, and enrich your Zero Rely on technique. Join our insightful webinar!

Preserve My Seat!

Agrius is far from the only Iranian condition-sponsored team to engage in cyber functions targeting Israel. A report from Microsoft past thirty day period uncovered MuddyWater’s collaboration with a different cluster dubbed Storm-1084 (aka DEV-1084) to deploy the DarkBit ransomware.

The conclusions also come as ClearSky disclosed that no less than eight web-sites related with transport, logistics, and monetary companies corporations in Israel were being compromised as part of a watering gap attack orchestrated by the Iran-connected Tortoiseshell group.

In a connected enhancement, Proofpoint disclosed that regional managed support suppliers (MSPs) inside of Israel have been specific by MuddyWater as part of a phishing campaign developed to initiate offer chain attacks from their downstream prospects.

The company security agency even further highlighted escalating threats to compact and medium-sized enterprises (SMBs) from innovative risk groups, which have been noticed leveraging compromised SMB infrastructure for phishing campaigns and monetary theft.

Observed this write-up exciting? Abide by us on Twitter  and LinkedIn to read additional distinctive articles we put up.


Some components of this article are sourced from:
thehackernews.com

Previous Post: «guac 0.1 beta: google's breakthrough framework for secure software supply GUAC 0.1 Beta: Google’s Breakthrough Framework for Secure Software Supply Chains
Next Post: China’s Stealthy Hackers Infiltrate U.S. and Guam Critical Infrastructure Undetected china's stealthy hackers infiltrate u.s. and guam critical infrastructure undetected»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Enzo Biochem Hit by Ransomware, 2.5 Million Patients’ Data Compromised
  • US and Korean Agencies Issue Warning on North Korean Cyber-Attacks
  • Malicious PyPI Packages Use Compiled Python Code to Bypass Detection
  • New Botnet Malware ‘Horabot’ Targets Spanish-Speaking Users in Latin America
  • The Importance of Managing Your Data Security Posture
  • Camaro Dragon Strikes with New TinyNote Backdoor for Intelligence Gathering
  • Insurers Predict $33bn Bill for Catastrophic “Cyber Event”
  • Chinese Phishing Gang “PostalFurious” Expands Campaign
  • Kaspersky Says it is Being Targeted By Zero-Click Exploits
  • North Korea’s Kimsuky Group Mimics Key Figures in Targeted Cyber Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.