A politically motivated hacker group tied to a series of espionage and sabotage attacks on Israeli entities in 2021 incorporated a previously undocumented remote access trojan (RAT) that masquerades as the Windows Calculator app as part of a conscious effort to stay under the radar.
Cybersecurity company Cybereason, which has been tracking the operations of the Iranian actor known as Moses Staff, dubbed the malware "StrifeWater."
"The StrifeWater RAT appears to be used in the initial stage of the attack and this stealthy RAT has the ability to remove itself from the system to cover the Iranian group's tracks," Tom Fakterman, Cybereason security analyst, said in a report. "The RAT possesses other capabilities, such as command execution and screen capturing, as well as the ability to download additional extensions."
Moses Staff came to light towards the end of last year when Check Point Research unmasked a series of attacks aimed at Israeli organizations since September 2021 with the objective of disrupting the targets' business operations by encrypting their networks, with no option to regain access or negotiate a ransom.
The intrusions were notable for the fact that they relied on the open-source library DiskCryptor to perform volume encryption, in addition to infecting the systems with a bootloader that prevents them from starting without the correct encryption key.
To date, victims have been reported beyond Israel, including Italy, India, Germany, Chile, Turkey, the U.A.E., and the U.S.
The new piece of the attack puzzle discovered by Cybereason comes in the form of a RAT that's deployed under the name "calc.exe" (the Windows Calculator binary) and is used during the early stages of the infection chain, only to be removed prior to the deployment of the file-encrypting malware.
The removal and the subsequent replacement of the malicious calculator executable with the legitimate binary, the researchers suspect, is an attempt on the part of the threat actor to cover up tracks and erase evidence of the trojan, not to mention enable them to evade detection until the final phase of the attack when the ransomware payload is executed.
StrifeWater, for its part, is no different from its counterparts and comes with numerous features, chief among them being the ability to list system files, execute system commands, take screen captures, create persistence, and download updates and auxiliary modules.
"The end goal for Moses Staff appears to be more politically motivated rather than financial," Fakterman concluded. "Moses Staff employs ransomware post-exfiltration not for financial gain, but to disrupt operations, obfuscate espionage activity, and to inflict damage to systems to advance Iran's geopolitical goals."
Related posts- Easy Hack Tools
- Pentest Tools Nmap
- Hacking Tools For Kali Linux
- Free Pentest Tools For Windows
- Hacking Tools For Windows Free Download
- Hack Website Online Tool
- Wifi Hacker Tools For Windows
- Hacker Search Tools
- Hacking Tools For Games
- Hacker Tools Windows
- Pentest Recon Tools
- Pentest Tools Port Scanner
- Top Pentest Tools
- Kik Hack Tools
- Hacking Apps
- Pentest Tools Port Scanner
- Hacking Tools For Mac
- Hacking Tools 2019
- Bluetooth Hacking Tools Kali
- Hacking Tools For Kali Linux
- Hacker Tools 2019
- Pentest Tools For Windows
- Pentest Tools Tcp Port Scanner
- Physical Pentest Tools
- Pentest Tools Website
- How To Hack
- Hacking Apps
- Pentest Tools Download
- Pentest Tools Apk
- Hacker Tools Free Download
- Pentest Tools Tcp Port Scanner
- Pentest Tools Framework
- Hacker Security Tools
- Nsa Hack Tools
- Pentest Tools List
- Hacking Tools Download
- Pentest Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Free
- Hack Tools For Ubuntu
- Hacker Tools For Pc
- Tools For Hacker
- Hack And Tools
- Hacker Tools Hardware
- Underground Hacker Sites
- Hacker Tools Online
- Beginner Hacker Tools
- Hacking App
- What Is Hacking Tools
- Pentest Automation Tools
- Pentest Tools Online
- Tools For Hacker
- Hacking App
- Hacker
- What Is Hacking Tools
- Hacking Tools Online
- Termux Hacking Tools 2019
- Hack Tools Mac
- Hacker
- Wifi Hacker Tools For Windows
- Hacking Tools Kit
- Hacker Tools 2019
- Hacker Tools Software
- Pentest Tools Review
- Hacking Tools For Beginners
- Pentest Tools Website
- Hacking Tools For Games
- Pentest Tools Online
- Hacking Tools For Windows 7
- What Is Hacking Tools
- Hack Tools For Mac
- Hackers Toolbox
- Hacker
- Top Pentest Tools
- Easy Hack Tools
- Hacking Tools Hardware
- Hacker Tools Apk Download
- What Are Hacking Tools
- Pentest Tools Subdomain
- Hacker Tools For Pc
- Termux Hacking Tools 2019
- Pentest Tools Url Fuzzer
- Pentest Reporting Tools
- Pentest Tools Tcp Port Scanner
- Hacking Tools 2019
- Hack Tools Github
- Hacker Hardware Tools
- Beginner Hacker Tools
- Hacking Tools Free Download
- Easy Hack Tools
- Hacking Tools For Beginners
- Pentest Tools Port Scanner
- Tools For Hacker
- Install Pentest Tools Ubuntu
- Hacking Tools Mac
- Pentest Tools Kali Linux
- Hack Tools For Games
- Hack Tools For Ubuntu
- New Hack Tools
- Android Hack Tools Github
- Hack App
- Pentest Tools Review
- Hacker Tools For Ios
- Pentest Tools Kali Linux
- New Hacker Tools
- Hack Tools For Games
- Hacker Tools Apk
- Hacker Security Tools
- Ethical Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Nsa Hack Tools Download
- Hacking App
- Hack Website Online Tool
- Tools 4 Hack
- Hacker Tools List
- Hacker Tools Software
- Hacking Tools For Windows Free Download
- Hacking Tools For Games
- Hacking Tools Mac
- Pentest Tools
- Hacker Hardware Tools
- Hacking Apps
- Best Pentesting Tools 2018
- Hacker Tools Apk
- Pentest Tools Port Scanner
- Tools Used For Hacking
- Easy Hack Tools
- Underground Hacker Sites
- Hacker Tools Free
- Hacker Tools Online
- Beginner Hacker Tools
- Pentest Tools Website Vulnerability
- Tools 4 Hack
- Pentest Tools Bluekeep
- Hack Tools For Windows
- Underground Hacker Sites
- Physical Pentest Tools
- Hacking Tools For Windows 7
- Pentest Tools Nmap
- Pentest Tools Framework
- Pentest Box Tools Download
- Underground Hacker Sites
- Pentest Tools Subdomain
- Hacker Tools For Pc
- What Are Hacking Tools
- Hacking Tools Pc