• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian cyber espionage group targets financial and government sectors in

Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East

You are here: Home / General Cyber Security News / Iranian Cyber Espionage Group Targets Financial and Government Sectors in Middle East
November 1, 2023

A menace actor affiliated with Iran’s Ministry of Intelligence and Security (MOIS) has been noticed waging a complex cyber espionage campaign targeting economic, authorities, army, and telecommunications sectors in the Middle East for at least a year.

Israeli cybersecurity company Examine Issue, which discovered the marketing campaign along with Sygnia, is tracking the actor less than the title Scarred Manticore, which is mentioned to intently overlap with an rising cluster dubbed Storm-0861, 1 of the four Iranian groups connected to destructive attacks on the Albanian governing administration previous calendar year.

Victims of the operation span various international locations this sort of as Saudi Arabia, the United Arab Emirates, Jordan, Kuwait, Oman, Iraq, and Israel.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Scarred Manticore also exhibits some diploma of overlap with OilRig, yet another Iranian nation-condition crew that was not long ago attributed to an attack on an unnamed Middle East governing administration between February and September 2023 as component of an eight-month-long campaign.

Cybersecurity

An additional established of tactical overlaps have been discovered in between the adversary and an intrusion established codenamed ShroudedSnooper by Cisco Talos. Attack chains orchestrated by the danger actor have singled out telecom vendors in the Center East utilizing a stealthy backdoor known as HTTPSnoop.

The activity represented by Scarred Manticore is characterised by the use of a formerly unknown passive malware framework referred to as LIONTAIL that’s installed on Windows servers. The risk actor is considered to be active because at the very least 2019.

“Scarred Manticore has been pursuing superior-worth targets for yrs, making use of a range of IIS-based backdoors to attack Windows servers,” Verify Position researchers explained in a Tuesday evaluation. “These involve a wide variety of customized web shells, customized DLL backdoors, and driver-based implants.”

An highly developed piece of malware, LIONTAIL is a assortment of custom shellcode loaders and memory resident shellcode payloads. A noteworthy ingredient of the framework is a light-weight-however-innovative implant composed in C that allows attackers to execute commands remotely by means of HTTP requests.

The attack sequences entail infiltrating publicly struggling with Windows servers to kick off the malware supply method and systematically harvest delicate facts from contaminated hosts.

Cyber Espionage Group

“Instead of making use of the HTTP API, the malware utilizes IOCTLs to interact right with the fundamental HTTP.sys driver,” the scientists claimed, detailing the command-and-command (C2) mechanism.

“This approach is stealthier as it doesn’t involve IIS or HTTP API, which are typically closely monitored by security methods, but is not a clear-cut endeavor given that the IOCTLs for HTTP.sys are undocumented and need further investigate initiatives by the risk actors.”

Also deployed together with LIONTAIL include a variety of web shells and a web forwarder device identified as LIONHEAD, a web forwarder.

Historical exercise of Scarred Manticore implies a continuous evolution of the group’s malware arsenal, what with the menace actor formerly relying on web shells this sort of as Tunna and a bespoke model identified as FOXSHELL for backdoor obtain.

Cybersecurity

Given that mid-2020, the menace actor is also reported to have utilized a .NET-primarily based passive backdoor referred to as SDD that establishes C2 interaction via an HTTP listener on the contaminated equipment with the final purpose of executing arbitrary commands, uploading and downloading documents, and operating extra .NET assemblies.

The progressive updates to the danger actor’s techniques and resources is typical of innovative persistent risk (APT) teams and demonstrates their means and various skills. This is very best exemplified by Scarred Manticore’s use of a malicious kernel driver identified as WINTAPIX that was uncovered by Fortinet earlier this May possibly.

In a nutshell, WinTapix.sys functions as a loader to execute the upcoming stage of the attack, injecting an embedded shellcode into a acceptable person manner procedure that, in transform, executes an encrypted .NET payload especially designed to concentrate on Microsoft Internet Data Services (IIS) servers.

The focusing on of Israel will come amid the ongoing Israel-Hamas war, prompting low-sophistication hacktivist teams to attack different companies in the place, as effectively as nations like India and Kenya, suggesting country-point out actors’ reliance on information functions aimed at influencing the global perception of the conflict.

“LIONTAIL framework parts share very similar obfuscation and string artifacts with FOXSHELL, SDD backdoor, and WINTAPIX motorists,” Test Issue explained.

“Analyzing the record of their pursuits, it gets evident how far the threat actor has come in strengthening their attacks and maximizing their strategy which depends on passive implants.”

Observed this short article fascinating? Stick to us on Twitter  and LinkedIn to examine more distinctive content material we post.


Some components of this write-up are sourced from:
thehackernews.com

Previous Post: «north korean hackers tageting crypto experts with kandykorn macos malware North Korean Hackers Tageting Crypto Experts with KANDYKORN macOS Malware
Next Post: Hands on Review: LayerX’s Enterprise Browser Security Extension hands on review: layerx's enterprise browser security extension»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.