• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide

You are here: Home / General Cyber Security News / Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide

Some 250 servers were seemingly breached by the Lebanese Cedar APT group, an organization with suspected hyperlinks to the Hezbollah Cyber Unit in Lebanon.

The target victims incorporate providers from lots of nations, which includes the United States, United Kingdom, Saudi Arabia, Egypt, Jordan, Lebanon, Israel and the Palestinian Authority.

Numerous a lot more organizations and companies have been hacked and that beneficial facts was stolen above durations of months and decades, ClearSky researchers wrote in a website posted.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Avast Ultimate Suite 2021

Protect yourself against all threads using AVAST Ultimate Suite. AVAST Ultimate Suite protects your Windows, macOS and your Android via Avast Premium. In addition it comes with AVAST's well-known VPN service SecureLineVPN. Therefore, it will be a security and privacy in one package.

Get AVAST Ultimate Suite with 65% discount certified seller: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The security company, which initial detected suspicious action in early 2020, claimed the attack was primarily based on a modified JSP file browser with a distinctive string that the adversary employed to deploy “Explosive” V4 Remote Entry Software (RAT) or “Caterpillar” V2 WebShell in the victims’ networks. The file was mounted in susceptible Atlassian Jira and Oracle 10g servers. Lebanese Cedar exploited 1-day publicly identified vulnerabilities this sort of as CVE-2012-3152 to install the JSP in vulnerable servers.

The APT team – also referred to as “Volatile Cedar” – has been working considering that 2012 and has stored a low profile, traveling under the radar, considering the fact that 2015 when its functions were being 1st discovered by CheckPoint researchers and Kaspersky Labs.

ClearSky agrees with CheckPoint’s preliminary report that Lebanese Cedar APT is motivated by political and ideological interests, targeting persons, providers and establishments globally and has powerful ties to the Lebanese authorities or a political team in Lebanon.

The Lebanese group’s attacks started by using acknowledged vulnerabilities on public web servers, then distributing tailor made malware to steal files, when staying concealed, mentioned Ivan Righi, cyber threat intelligence analyst at Electronic Shadows, extra that. The group has utilized a tailor made-published malware called “Explosive,” an facts-thieving Trojan that the team has utilised due to the fact 2015, he claimed. The Explosive malware seems to have absent by means of various versions, generally up to date to stay away from antivirus detection.

“The most up-to-date marketing campaign utilised a new version of Explosive with new capabilities,” Righi said. “Lebanese Cedar, or Volatile Cedar, is technically-superior and has proven efficient use of techniques, characterizing them as a higher-stage threat. Activity was past publicly-claimed on in 2015 and is joined to the Shia Islamist political party and militant team Hezbollah. They probably conducted this campaign to aid Hezbollah’s motives to get hold of sensitive data.”


Some components of this short article are sourced from:
www.scmagazine.com

Previous Post: «Firms With Exposed Iot Have A Higher Concentration Of Other Firms with exposed IoT have a higher concentration of other security problems

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Lebanese APT group with suspected links to Hezbollah breached 250 servers worldwide
  • Firms with exposed IoT have a higher concentration of other security problems
  • As SolarWinds spooks tech firms into rechecking code, some won’t like what they find
  • Microsoft 365 Becomes Haven for BEC Innovation
  • WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites
  • Cyber-Cop Charged with Forgery and Bigamy
  • Miss England Held to Ransom by Cyber-attackers
  • Flaws in open source library used by DoD, IC for satellite imagery could lead to system takeovers
  • Texas Tech Company Scoops Fourth Equality Title
  • Does SolarWinds change the rules in offensive cyber? Experts say no, but offer alternatives

Copyright © TheCyberSecurity.News, All Rights Reserved.