web analytics

Iran APTs Tag Team Espionage, Wiper Attacks Against Israel & Albania – Source: www.darkreading.com

Rate this post

Source: www.darkreading.com – Author: Nate Nelson, Contributing Writer

Closeup of stone carving

Source: ASP Religion via Alamy Stock Photo

Iranian state-backed threat actors have been working closely to spy on, and then wreak havoc against, major organizations in Albania and Israel.

Iran’s Ministry of Intelligence and Security (MOIS)-linked Scarred Manticore (aka Storm-861), Iran’s most sophisticated espionage actor, has been spying on high-value organizations across the Middle East and beyond for some time now. The group is so effective at what it does, in fact, that an entirely different MOIS advanced persistent threat (APT) — Void Manticore (aka Storm-842) — is piggybacking off of its initial access to launch destructive campaigns of its own.

To date, Void Manticore claims to have successfully targeted more than 40 Israeli organizations, with a number of high-profile campaigns in Albania as well.

Void Manticore, Scarred Manticore

As described in a blog post from Check Point Research, the arrangement between manticores is simple, and leverages each group’s strengths.

First, Scarred Manticore does the spying. Its clever, fileless Liontail malware framework allows it to quietly perform email data exfiltration, often for well over a year’s time.

Then, says Sergey Shykevich, threat intelligence group manager at Check Point, “When there is some escalation, like with Mojahedin-e-Khalq (MEK) in Albania or with the war in Israel, there’s some decisionmaker in the government that decides, ‘Let’s go burn our cyber access for espionage and instead do influence and destructive operations.’ And then they pass it to the other actor, focused on the same organization.”

Where Scarred Manticore is incisive and subtle, Void Manticore is loud and messy.

Part of the operation is about hack-and-leaks, where Void Manticore operates under the faketivist personas Homeland Justice, for campaigns pertaining to Albania, and Karma, for Israel.

The group’s other job is sheer demolition. Using largely basic and publicly available tooling — like remote desktop protocol (RDP) for lateral movement, and the reGeorg Web shell — it aims for an organization’s files and then starts swinging. Sometimes, this involves manually deleting files and shared drives.

The group also has an arsenal of custom wipers, which can generally be thought of in two categories. Some are designed to corrupt specific files or file types, a more targeted approach.

Other Void Manticore wipers target the partition table — the part of the host system responsible for mapping out where files are located on the disk. By ruining the partition table, the data on the disk remains untouched yet inaccessible.

Fighting Two Against One

Organizations on the receiving end of Iranian state-level attacks might find it extra challenging to defend against two different threat actors, each with their own tools, infrastructure, tactics, techniques, and procedures (TTPs). “It’s a new phenomenon,” Shykevich admits, “so I don’t think anyone has really thought deeply about this yet.”

The easier path may be to focus on the initial threat, despite its greater sophistication, because espionage campaigns typically take far longer than destructive ones. “Once someone encounters the destructive actor, they must operate immediately. We’ve seen when the destructive actor receives access to the network, it operates almost immediately. So the timeframe, from the handoff between these two actors before the destruction starts, is very small,” he says.

There are also simple defenses any organization can prepare to keep out either group. Void Manticore’s simplistic TTPs, for one, can generally be blocked with competent endpoint security.

Even Scarred Manticore’s stealthy espionage can be cut off early, at the source. In most cases, it begins its attacks by exploiting CVE-2019-0604, a critical but half-decade-old Microsoft Sharepoint vulnerability. “So it’s preventable,” Shykevich says. “It’s not like it’s a zero-day, or some other thing where there’s zero means to prevent it.”

Original Post URL: https://www.darkreading.com/threat-intelligence/iran-apts-tag-team-espionage-wiper-attacks-against-israel-and-albania

Category & Tags: –

Views: 0

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts