• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian cyber espionage group targets financial and government sectors in

Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East

You are here: Home / General Cyber Security News / Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East
November 1, 2023

A menace actor affiliated with Iran’s Ministry of Intelligence and Security (MOIS) has been noticed waging a complex cyber espionage campaign targeting economic, authorities, army, and telecommunications sectors in the Middle East for at least a year.

Israeli cybersecurity company Examine Issue, which discovered the marketing campaign along with Sygnia, is tracking the actor less than the title Scarred Manticore, which is mentioned to intently overlap with an rising cluster dubbed Storm-0861, 1 of the four Iranian groups connected to destructive attacks on the Albanian governing administration previous calendar year.

Victims of the operation span various international locations this sort of as Saudi Arabia, the United Arab Emirates, Jordan, Kuwait, Oman, Iraq, and Israel.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Scarred Manticore also exhibits some diploma of overlap with OilRig, yet another Iranian nation-condition crew that was not long ago attributed to an attack on an unnamed Middle East governing administration between February and September 2023 as component of an eight-month-long campaign.

Cybersecurity

An additional established of tactical overlaps have been discovered in between the adversary and an intrusion established codenamed ShroudedSnooper by Cisco Talos. Attack chains orchestrated by the danger actor have singled out telecom vendors in the Center East utilizing a stealthy backdoor known as HTTPSnoop.

The activity represented by Scarred Manticore is characterised by the use of a formerly unknown passive malware framework referred to as LIONTAIL that’s installed on Windows servers. The risk actor is considered to be active because at the very least 2019.

“Scarred Manticore has been pursuing superior-worth targets for yrs, making use of a range of IIS-based backdoors to attack Windows servers,” Verify Position researchers explained in a Tuesday evaluation. “These involve a wide variety of customized web shells, customized DLL backdoors, and driver-based implants.”

An highly developed piece of malware, LIONTAIL is a assortment of custom shellcode loaders and memory resident shellcode payloads. A noteworthy ingredient of the framework is a light-weight-however-innovative implant composed in C that allows attackers to execute commands remotely by means of HTTP requests.

The attack sequences entail infiltrating publicly struggling with Windows servers to kick off the malware supply method and systematically harvest delicate facts from contaminated hosts.

Cyber Espionage Group

“Instead of making use of the HTTP API, the malware utilizes IOCTLs to interact right with the fundamental HTTP.sys driver,” the scientists claimed, detailing the command-and-command (C2) mechanism.

“This approach is stealthier as it doesn’t involve IIS or HTTP API, which are typically closely monitored by security methods, but is not a clear-cut endeavor given that the IOCTLs for HTTP.sys are undocumented and need further investigate initiatives by the risk actors.”

Also deployed together with LIONTAIL include a variety of web shells and a web forwarder device identified as LIONHEAD, a web forwarder.

Historical exercise of Scarred Manticore implies a continuous evolution of the group’s malware arsenal, what with the menace actor formerly relying on web shells this sort of as Tunna and a bespoke model identified as FOXSHELL for backdoor obtain.

Cybersecurity

Given that mid-2020, the menace actor is also reported to have utilized a .NET-primarily based passive backdoor referred to as SDD that establishes C2 interaction via an HTTP listener on the contaminated equipment with the final purpose of executing arbitrary commands, uploading and downloading documents, and operating extra .NET assemblies.

The progressive updates to the danger actor’s techniques and resources is typical of innovative persistent risk (APT) teams and demonstrates their means and various skills. This is very best exemplified by Scarred Manticore’s use of a malicious kernel driver identified as WINTAPIX that was uncovered by Fortinet earlier this May possibly.

In a nutshell, WinTapix.sys functions as a loader to execute the upcoming stage of the attack, injecting an embedded shellcode into a acceptable person manner procedure that, in transform, executes an encrypted .NET payload especially designed to concentrate on Microsoft Internet Data Services (IIS) servers.

The focusing on of Israel will come amid the ongoing Israel-Hamas war, prompting low-sophistication hacktivist teams to attack different companies in the place, as effectively as nations like India and Kenya, suggesting country-point out actors’ reliance on information functions aimed at influencing the global perception of the conflict.

“LIONTAIL framework parts share very similar obfuscation and string artifacts with FOXSHELL, SDD backdoor, and WINTAPIX motorists,” Test Issue explained.

“Analyzing the record of their pursuits, it gets evident how far the threat actor has come in strengthening their attacks and maximizing their strategy which depends on passive implants.”

Observed this short article fascinating? Stick to us on Twitter  and LinkedIn to examine more distinctive content material we post.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «north korean hackers tageting crypto experts with kandykorn macos malware North Korean Hackers Tageting Crypto Experts with KANDYKORN macOS Malware
Next Post: Hands on Review: LayerX’s Enterprise Browser Security Extension hands on review: layerx's enterprise browser security extension»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.