Powered by MOMENTUM MEDIA
cyber daily logo

Breaking news and updates daily. Subscribe to our Newsletter

Breaking news and updates daily. Subscribe to our Newsletter X facebook linkedin Instagram Instagram

Iranian hackers target Israeli organisations in long cyber campaign

Iranian hackers have been launching cyber attacks on Israeli tech and higher education sectors in an attempt to steal sensitive information, according to a new report.

user icon Daniel Croft
Wed, 08 Nov 2023
Iranian hackers target Israeli organisations in long cyber campaign
expand image

The attacks began in January 2023 and have been observed as recently as October. According to Palo Alto Networks Unit 42, the threat actors are linked to the Iranian state-backed Agonizing Serpens hacking group, which first made appearances in 2020 and is known for launching fake ransomware attacks and wiping tools on Israeli targets.

“Our investigation revealed the perpetrators of the attacks have strong connections to an Iranian-backed APT group Unit 42 tracks as Agonizing Serpens (aka Agrius, BlackShadow, Pink Sandstorm, DEV-0022),” it said.

Unit 42 also said that the group intends to steal intellectual property, sensitive information and personal details before wiping any evidence of their actions.

============
============

“The attacks are characterised by attempts to steal sensitive data, such as personally identifiable information (PII) and intellectual property,” it said.

“Once the attackers stole the information, they deployed various wipers intended to cover the attackers’ tracks and to render the infected endpoints unusable.”

The threat group gained access to victim systems by exploiting vulnerabilities in internet-facing web servers, where they would deploy web shells, which then execute recon commands, allowing the group to map out the network.

Palo Alto has observed this technique being used by the threat actor in many of its attacks.

Once in the victim’s system, the group then obtains admin credentials to execute administrator privileges.

The goal of the breach is to steal data from the victim’s database, with personal data including ID numbers, passport scans, full addresses and emails.

Following the exfiltration of data, the group then covers its tracks using three separate wiper programs. Then, it renders the system unusable by corrupting the boot sector and preventing it from booting up in the future.

Despite the campaign being launched 10 months ago, Palo Alto said that evidence suggests that Agonizing Serpens has “recently upgraded their capabilities” and has been rotating the use of different proof of concept and pen-testing tools to bolster its ability to bypass security measures such as endpoint detection and response (EDR).

For the full technological breakdown of their activities, visit the Palo Alto Networks Unit 42 website.

Daniel Croft

Daniel Croft

Born in the heart of Western Sydney, Daniel Croft is a passionate journalist with an understanding for and experience writing in the technology space. Having studied at Macquarie University, he joined Momentum Media in 2022, writing across a number of publications including Australian Aviation, Cyber Security Connect and Defence Connect. Outside of writing, Daniel has a keen interest in music, and spends his time playing in bands around Sydney.

cd intro podcast

Introducing Cyber Daily, the new name for Cyber Security Connect

Click here to learn all about it
newsletter
cyber daily subscribe
Be the first to hear the latest developments in the cyber industry.