Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021 using politically-themed phishing emails and decoy documents.
The intrusions are part of what Cisco Talos calls a longstanding espionage and information theft campaign undertaken by the Arid Viper hacking group using a Delphi-based implant called Micropsia dating all the way back to June 2017.
The threat actor's activities, also tracked under the monikers Desert Falcon and the APT-C-23, were first documented in February 2015 by Kasperksy and subsequently in 2017, when Qihoo 360 disclosed details of cross-platform backdoors developed by the group to strike Palestinian institutions.
The Russian cybersecurity company-branded Arid Viper the "first exclusively Arabic APT group."
Then in April 2021, Meta (formerly Facebook), which pointed out the group's affiliations to the cyber arm of Hamas, said it took steps to boot the adversary off its platform for distributing mobile malware against individuals associated with pro-Fatah groups, the Palestinian government organizations, military and security personnel, and student groups within Palestine.
Decoy document containing text on Palestinian reunification
The raft of new activity relies on the same tactics and document lures used by the group in 2017 and 2019, suggesting a "certain level of success" despite a lack of change in their tooling. More recent decoy files reference themes of Palestinian reunification and sustainable development in the territory that, when opened, lead to the installation of Micropsia on compromised machines.
The backdoor is designed to give the operators an unusual range of control over the infected devices, including the ability to harvest sensitive information and execute commands transmitted from a remote server, such as capturing screenshots, recording the current activity log, and downloading additional payloads.
"Arid Viper is a prime example of groups that aren't very advanced technologically, however, with specific motivations, are becoming more dangerous as they evolve over time and test their tools and procedures on their targets," researchers Asheer Malhotra and Vitor Ventura said.
"These [remote access trojans] can be used to establish long-term access into victim environments and additionally deploy more malware purposed for espionage and stealing information and credentials."
- Hacking Tools Free Download
- Hacking Tools Download
- Hacker Hardware Tools
- What Are Hacking Tools
- Hacking Tools Online
- Pentest Tools Find Subdomains
- Hack Apps
- Hacking Tools Windows
- Hack Tools For Windows
- Hack Tool Apk No Root
- Hacker Search Tools
- Hack Tools
- Pentest Tools Website
- Ethical Hacker Tools
- Hacker Tools Apk Download
- Hacker Tools 2020
- Game Hacking
- Hacks And Tools
- Hack Tools Github
- How To Make Hacking Tools
- Hack Apps
- Pentest Tools List
- Usb Pentest Tools
- Hacker Tools Linux
- Hack Tools For Mac
- Hacking Apps
- Hacking Tools Windows 10
- Hacker Hardware Tools
- Android Hack Tools Github
- Hacker Tools Windows
- How To Make Hacking Tools
- Hack Apps
- Hacking Tools Usb
- Android Hack Tools Github
- Top Pentest Tools
- Hack Tool Apk No Root
- Hacking Tools For Pc
- Termux Hacking Tools 2019
- Hack Rom Tools
- Pentest Tools For Android
- Wifi Hacker Tools For Windows
- Hack Tool Apk No Root
- What Are Hacking Tools
- Hacker Tools 2020
- Tools For Hacker
- Hacker Hardware Tools
- Pentest Tools Subdomain
- Pentest Tools Subdomain
- Pentest Tools Port Scanner
- Hak5 Tools
- Pentest Tools Download
- Hacking Tools For Kali Linux
- Pentest Recon Tools
- Hack Tools For Mac
- Hacker Tools Apk Download
- Usb Pentest Tools
- Android Hack Tools Github
- Kik Hack Tools
- Hacker Security Tools
- Nsa Hacker Tools
- Hack Tools Download
- Hacker Tools 2020
- Ethical Hacker Tools
- Hack Tools 2019
- Hack App
- Hacker Tools Windows
- World No 1 Hacker Software
- Hacking Tools 2020
- Ethical Hacker Tools
- Hack App
- Pentest Tools For Ubuntu
- Hack App
- Hacking Tools 2020
- Pentest Reporting Tools
- Hacking Apps
- Kik Hack Tools
- Bluetooth Hacking Tools Kali
- Hacking Tools 2020
- Top Pentest Tools
- Pentest Tools Alternative
- Nsa Hacker Tools
- Usb Pentest Tools
- Pentest Recon Tools
- Hacker Tools Free Download
- Android Hack Tools Github
- Hacker Security Tools
- New Hacker Tools
- Pentest Tools Url Fuzzer
- What Are Hacking Tools
- Pentest Tools Kali Linux
- Blackhat Hacker Tools
- Best Hacking Tools 2020
- Hacker Search Tools
- Hacking Tools For Beginners
- Pentest Tools Subdomain
- Nsa Hack Tools Download
- Hacker Tools For Windows
- Hacker Security Tools
- Computer Hacker
- How To Hack
- Wifi Hacker Tools For Windows
- Hacking Tools And Software
- Pentest Tools Website Vulnerability
- Hack Tools Github
- Game Hacking
- Pentest Tools Website Vulnerability
- Hacker
- Nsa Hack Tools Download
- Pentest Tools For Ubuntu
- Hacking Tools Mac
- Hack Rom Tools
- Hacker Tools
- Hacker Tools Free Download
- Hack Tools
- Hacker Tools Apk Download
- Hacking Tools Github
- Pentest Tools Online
- Hacker Tools
- Pentest Tools Bluekeep
- Pentest Recon Tools
- Best Hacking Tools 2020
- Hacker Tools For Pc
- Pentest Tools Linux
- Pentest Tools Review
- Hacker Search Tools
- Tools Used For Hacking
- Pentest Tools Review
- Pentest Tools Windows
- Pentest Tools Windows
- Pentest Tools Website
- Nsa Hacker Tools
- Nsa Hacker Tools
- Hacker Tools Free Download
- Nsa Hack Tools Download
- Best Pentesting Tools 2018
- Pentest Tools Free
- Pentest Tools Subdomain
- Hack Tools For Ubuntu
- World No 1 Hacker Software
- Pentest Tools For Android
- Hacker Security Tools
- Hack Tools
- Hacking Tools For Kali Linux
- Pentest Tools For Mac
- Pentest Tools Download
- Hacking Tools Hardware
- Hacking Tools For Windows 7
- Beginner Hacker Tools
- Hacking Tools For Mac
- Hacker Tools 2020
- Top Pentest Tools
- Pentest Tools Open Source
- Best Pentesting Tools 2018
- Tools For Hacker
- Nsa Hacker Tools
- New Hack Tools
- Pentest Tools Linux
- Hacking Tools Github
- Android Hack Tools Github
- Hack Tools 2019
- Pentest Tools Subdomain