• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
iranian mois linked hackers behind destructive attacks on albania and israel

Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel

You are here: Home / General Cyber Security News / Iranian MOIS-Linked Hackers Behind Destructive Attacks on Albania and Israel
May 20, 2024

An Iranian risk actor affiliated with the Ministry of Intelligence and Security (MOIS) has been attributed as driving harmful wiping attacks targeting Albania and Israel less than the personas Homeland Justice and Karma, respectively.

Cybersecurity company Test Issue is tracking the action under the moniker Void Manticore, which is also known as Storm-0842 (formerly DEV-0842) by Microsoft.

“There are distinct overlaps in between the targets of Void Manticore and Scarred Manticore, with indications of systematic hand off of targets involving all those two teams when selecting to perform damaging things to do in opposition to current victims of Scarred Manticore,” the corporation claimed in a report published today.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The threat actor is recognized for its disruptive cyber attacks in opposition to Albania considering the fact that July 2022 underneath the name Homeland Justice that include the use of bespoke wiper malware called Cl Wiper and No-Justice (aka LowEraser).

Identical wiper malware attacks have also targeted Windows and Linux units in Israel pursuing the Israel-Hamas war soon after Oct 2023 working with another customer wiper codenamed BiBi. The pro-Hamas hacktivist team goes by the title Karma.

Cybersecurity

Attack chains orchestrated by the team are “straightforward and simple,” generally leveraging publicly out there instruments and generating use of Distant Desktop Protocol (RDP), Server Message Block (SMB), and File Transfer Protocol (FTP) for lateral movement prior to malware deployment.

First access in some instances is accomplished by the exploitation of recognized security flaws in internet-experiencing purposes (e.g., CVE-2019-0604), in accordance to an advisory launched by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) in September 2022.

A prosperous foothold is followed by the deployment of web shells, such as a homebrewed one known as Karma Shell that masquerades as an error web site but is able of enumerating directories, producing procedures, uploading information, and commencing/stopping/listing companies.

Void Manticore is suspected of making use of obtain formerly obtained by Scarred Manticore (aka Storm-0861) to have out its personal intrusions, underscoring a “handoff” method concerning the two risk actors.

This large degree of cooperation was earlier also highlighted by Microsoft in its have investigation into attacks focusing on Albanian governments in 2022, noting that numerous Iranian actors participated in it and that they had been accountable for unique phases –

  • Storm-0861 obtained preliminary entry and exfiltrated facts
  • Storm-0842 deployed the ransomware and wiper malware
  • Storm-0166 exfiltrated information
  • Storm-0133 probed sufferer infrastructure

It is really also well worth pointing out that Storm-0861 is assessed to be a subordinate factor in just APT34 (aka Cobalt Gypsy, Hazel Sandstorm, Helix Kitten, and OilRig), an Iranian country-condition team regarded for the Shamoon and ZeroCleare wiper malware.

“The overlaps in approaches used in attacks against Israel and Albania, like the coordination in between the two distinctive actors, recommend this method has turn into schedule,” Look at Place mentioned.

“Void Manticore’s functions are characterized by their dual technique, combining psychological warfare with real data destruction. This is achieved by their use of wiping attacks and by publicly leaking data, thus amplifying the destruction on the specific organizations.”

Identified this report intriguing? Adhere to us on Twitter  and LinkedIn to read a lot more special information we post.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «foxit pdf reader flaw exploited by hackers to deliver diverse Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Next Post: “Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit "linguistic lumberjack" vulnerability discovered in popular logging utility fluent bit»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Fortinet Releases Patch for Critical SQL Injection Flaw in FortiWeb (CVE-2025-25257)
  • PerfektBlue Bluetooth Vulnerabilities Expose Millions of Vehicles to Remote Code Execution
  • Securing Data in the AI Era
  • Critical Wing FTP Server Vulnerability (CVE-2025-47812) Actively Being Exploited in the Wild
  • Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
  • CISA Adds Citrix NetScaler CVE-2025-5777 to KEV Catalog as Active Exploits Target Enterprises
  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS

Copyright © TheCyberSecurity.News, All Rights Reserved.